End-to-end measurements of GPRS-EDGE networks have

Size: px
Start display at page:

Download "End-to-end measurements of GPRS-EDGE networks have"

Transcription

1 End-to-end measurements over GPRS-EDGE networks Juan Andrés Negrera Facultad de Ingenería, Unversdad de la Repúblca Montevdeo, Uruguay Javer Perera Facultad de Ingenería, Unversdad de la Repúblca Montevdeo, Uruguay Pablo Belzarena Facultad de Ingenería, Unversdad de la Repúblca Montevdeo, Uruguay Santago Pérez Facultad de Ingenería, Unversdad de la Repúblca Montevdeo, Uruguay ABSTRACT In the last years, QoS (Qualty of Servce) parameter estmaton has become a man research area n networkng due to a contnuous growth of the Internet End-to-end actve measurement s one of the topcs that focuses on ths research area However, these measurement methodologes have focused on end-to-end measurements over the wred Internet The development of cellular data servces s shftng the resarch focus on QoS from wred to wreless networks End-to-end measurement methodologes of cellular networks have some ssues that are not consdered by tradtonal measurement technques Ths paper analyzes these ssues and suggests an end-to-end actve measurement methodology that deals wth these partcular problems The proposed research and measurement methodology s based on a GSM (Global System for Moble Communcatons) network, partcularly on data servces on a GPRS-EDGE (General Packet Rado Servce/Enhanced Data Rates for GSM Evoluton) network Several experments n dfferent stuatons have been done n a real cellular network These experments have tested the performance of the methodology n dfferent data access condtons Categores and Subject Descrptors C4 [Performance of Systems]: Measurement technques, Performance attrbutes General Terms Network performance, Algorthms Keywords Performance, QoS, GSM, GPRS-EDGE Permsson to make dgtal or hard copes of all or part of ths work for personal or classroom use s granted wthout fee provded that copes are not made or dstrbuted for proft or commercal advantage and that copes bear ths notce and the full ctaton on the frst page To copy otherwse, to republsh, to post on servers or to redstrbute to lsts, requres pror specfc permsson and/or a fee LANC 07 October 10-11, San Jose, Costa Rca Copyrght 2007 ACM /07/0010 $500 1 INTRODUCTION Today cellular servces nclude voce communcatons, emal, sms, audo and vdeo streamng and moble TV Ths stuaton has been generated by the ncrease n cellular access bandwdth Ths type of servces have strong constrants n performance and qualty To deal wth ths constrants a model that analyzes the end-to-end performance of a GPRS- EDGE connecton s necessary Unfortunately, the analytcal models that have been developed to analyze the performance of cellular systems make strong smplfcatons They can only be used to get a rough dmenson of the system, but not to analyze the end-to-end performance of a partcular data flow End-to-end measurements of wred IP networks has been an mportant area of research durng last years Therefore, untl last years, the focus was only on wred networks and not on wreless networks End-to-end measurements of GPRS-EDGE networks have some partcular problems that are not consdered n the wred case For example, the spectrum resource sharng adds some specal ssues, as well as the prorty of the voce traffc The focus of ths work s on end-to-end GPRS-EDGE networks capacty estmaton and some other mportant performance ssues Ths work suggests a methodology for endto-end measurements of ths knd of networks Based on ths methodology a software tool was developed Usng that tool some experments have been done to estmate dfferent performance metrcs n a GPRS-EDGE network The paper s organzed as follows A summary about the state of art concernng end-to-end measurements over IP networks s n Secton 2 An explanaton of mportant parameters to measure over GPRS-EDGE s done n Secton 3 The measurements ssues over GPRS-EDGE networks are presented n Secton 4 An algorthm whch deals wth the matters presented n Secton 4 s explaned n Secton 5 The mplemented measurement system s explaned n Secton 6 Some results obtaned wth ths system are presented n Secton 7 In Secton 8, the nfluence of the transport layer protocols on the throughput measurement s studed Fnally, the paper s concluded n Sectons 9 and 10 2 RELATED WORKS The man research topcs on end-to-end measurements on

2 the Internet are: Lnk capacty or bottleneck lnk capacty estmaton n a network path There are many suggested procedures n order to estmate the capacty of a wred lnk Man technques are based on sendng fxed sze probe packet pars At the recever the nter-arrval tme s analyzed and, knowng the packet sze, the bottleneck capacty s estmated Each technque fts better dependng on the characterstcs of the path and the cross traffc In general, all technques work f there s not cross traffc However, n a heavy loaded network or n a path wth cross traffc n many lnks, the errors n the estmaton can be mportant [10] Cross traffc s defned as packets whch belongs to other connectons whch nterferes wth probe packets Internet tomography The goal of Internet tomography s to estmate lnk QoS parameters from end-to-end estmatons of these parameters [1, 3, 5, 6, 11, 14, 18] These works are related to the subject studed n ths paper, because they contrbute wth methodologes and deas to measure some end-to-end parameters However, they do not solve the problems that arse n wreless networks Lnk or path avalable bandwdth" measurement The avalable bandwdth (ABW) of a lnk n the tme nterval (t, t + τ) s A (t, t + τ) = C (1 u (t, t + τ)) (1) where C s the lnk capacty and u (t, t + τ) s the average lnk utlzaton n the tme nterval (t, t + τ) The mnmum A n the path s defned as the ABW of the path There are many developed algorthms to estmate the avalable bandwdth Pathload [7, 9, 8], PathChrp [15] and Spruce [17] are mportant examples of dfferent technques Strauss et al [17] compare Spruce wth other tools used to estmate the ABW, lke Pathload All these works are based on wred networks, where each lnk capacty s fxed and the packets share each lnk n a FIFO queue Ths work bulds a methodology that can be used for end-to-end performance estmaton over cellular networks, where the prevous assumptons are not necessarly true 3 WIRELESS LINK PERFORMANCE MEA- SURES Ths work s focused on the estmaton of the followng parameters Instantaneous lnk capacty Mean lnk capacty Actvty nterval tme Total throughput Mean throughput n an actvty nterval tme Round Trp Tme (RTT) Jtter These parameters wll be estmated by sendng probe packet pars of constant sze ϖ at constant rate The nter-arrval tme between pars at the clent s t In the followng subsectons the meanng of these parameters s explaned 31 Instantaneous lnk capacty In ths work, the rato between probe packet sze and nterarrval tme between two probe packets that were queued together n the lnk s called nstantaneous lnk capacty 32 Mean lnk capacty It s the sum of the nstantaneous lnk capacty multpled by the nterval tme n whch occurs, over the sum of these tme ntervals C = P C t P t 33 Actvty nterval tme In a TDMA (Tme Dvson Multple Access) system, each clent uses the channel durng a certan perod of tme that, n ths work, s called actvty nterval tme 34 Total throughput Total throughput s defned as the amount of data transferred over the transference tme 35 Mean throughput n an actvty nterval tme The average throughput of all the actvty nterval tmes s called mean throughput n an actvty nterval tme 36 Channel actvty tme Channel actvty tme s defned as: P Tactvty Act = (3) T tot where T actvty represents a gven actvty nterval tme and T tot s the total tme of the experment Ths parameter s mportant because t shows the tme percentage durng whch the clent had the channel 37 Packet loss The packet loss s defned as: (2) Loss = 1 P rc P ss (4) where P rc s the number of packets receved by the clent and P ss s the number of packets sent by the server 38 RTT The tme elapsed taken for an IP packet to travel to a remote place an back agan s called RTT 39 Jtter The varaton of succesve values of RTT s called Jtter Channel actvty tme Packet loss

3 4 MEASUREMENT METHODOLOGY 41 Measurement technque In each experment probe packets are sent at a constant rate for a short tme perod In order to estmate the nstantaneous bottleneck lnk capacty, probe packets must be enqueued together n the rado access buffer (assumng that the wreless lnk s the bottleneck) The packet rate to accomplsh ths s chosen as the maxmum moble capacty (that depends on the moble class) There s a tradeoff n the selecton of the probe packet sze The accuracy n the analsys of each actvty nterval tme s mportant In order to have more samples n each actvty nterval tme t s necessary to send packets wth the smallest sze allowed However, n order to have less uncertanty n the capacty estmaton from the measures of the nter-arrval tmes, t s preferred to use as bg as possble packet szes The tme stamp absolute error s around 1 ms To solve ths tradeoff packet szes around bytes are used These szes are the smallest that provde a capacty estmaton relatve error lower than 10% for the bggest GPRS- EDGE capactes that are around kbps Next subsecton summarzes the most common used methodologes for wred lnk capacty estmaton In subsecton 43 wreless lnk capacty estmaton problems are explaned 42 Bottleneck lnk capacty estmaton For each packet par the lnk capacty can be estmated as ϖ, where ϖ s the packets sze and t s the nter-arrval t tme between consecutve packets at the clent After ths estmaton, the values obtaned for each packet par are classfed for further processng By ths processng a fnal capacty s estmated If a par of packets (wth packet sze ϖ) wat together n the bottleneck lnk buffer (wth lnk capacty C), and n not any other lnk, the tme between arrvals s ϖ One C mportant ssue to pont out s that packet par estmaton capacty may be dstorted by cross traffc or by lmtatons on the measurement system There are two stuatons that may affect the measurements The frst stuaton happens f there s cross traffc between probe packets In ths case they wll be separated a tme T, whch s larger than the separaton mposed by the bottleneck capacty In ths case the system wll estmate a fake bottleneck capacty C < C The other stuaton happens when the probe packets wat n queues after the bottleneck lnk In ths case they wll jon together yeldng a fake bottleneck capacty C > C These effects are llustrated n fgure 1 These cases must be fltered The capacty estmaton wll be more accurate f the bottleneck lnk s not heavy loaded by cross traffc and the last queue of the path s at the bottleneck lnk Several technques are used for processng packets pars and estmate the capacty, flterng the cases explaned before Usually, hstogram classfcaton or kernel densty estmaton are used Pathrate [4] and Nettmer [10] use these technques The man dea of these algorthms s to estmate the capacty by fndng the maxmum of the dstrbuton (or hstogram) Ths value represents the estmated capacty that occurs more frequently Fgure 1: Cross traffc effect on bottleneck capacty measures Multclass Slot DL Slots UL Slots Actve Slots Table 1: Moble classfcaton by ts multclass slot type 43 Wreless TDMA systems ssues 431 Introducton In general, n cellular networks, the bottleneck s located on the ar nterface In addton to the problems explaned before n the case wred lnk capacty estmaton, the followng ssues arse n the case of cellular wreless lnks: Moble class Carrer to nterference ( c ) relaton Avalable tme slots for data transfer n the servng cell Moble class The moble class s a classfcaton between dfferent types of termnals whch determnes how many smultaneous tme slots can be used by the clent n order to transfer data Table 1 lsts most commonly used class types and the number of tme slots used for download (DL) and upload (UL) n each class Carrer to nterference relaton Carrer to nterference relaton ` c s the parameter whch determnes the effectve rate of data transfer per tme slot When c relaton s small, the error probablty durng the transfer s hgh In order to avod ths problem, when c relaton s small, more redundancy bts are used The more redundancy bts are used to transfer nformaton, the less s the nformaton rate per tme slot Table 2 lst dfferent avalable code schemes n EDGE (MCS) Avalable tme slots for data transfer The servce provder confgures the number of avalable tme slots for data transfer n the cell So, some of the confgu-

4 MCS BW per TS (at layer 2, n kbps) Table 2: Dfferent code schemes n EDGE Data User 1 Data User N Voce Users (GSM) C V V D OD OD OD OD C: Control channel V: Voce (GSM) channel D: Data channel OD: On demand channel (between voce and data) Fgure 2: Typcal GPRS-EDGE queueng system raton varables n the cell are the number of fxed tme slots assgned to data transfer, the number of fxed tme slots assgned to voce traffc and the number of on-demand tme slots between voce and data Usually, for the ondemand tme slots, voce calls has preemptve prorty over data transfers Cellular lnk capacty can not be estmated usng the same procedures as n the wred lnks case because cellular lnks may have capacty tme varatons Ths problem s analyzed n more detal n the followng subsecton 432 GPRS-EDGE Queueng System Fgure 2 shows a typcal GPRS-EDGE queueng system As t can be seen, ths system may nclude nteracton between voce and data users There are multple factors that mpact on the capacty estmaton In the followng paragraphs dfferent stuatons are analyzed n order of complexty Number of GSM users are less or equal than fxed voce slots, there s only one data user n the cell and a fxed relaton s assumed c In ths case, voce users do not use on-demand tme slots All data tme slots are avalable for the clent Therefore, the clent has all data resources avalable all the tme The capacty wll be only determned by the moble class and c relaton Assumng a fxed c relaton ths case s smlar to the classcal wred one, lke ADSL Number of GSM users are hgher than fxed voce slots, there s only one data user n the cell and a fxed c relaton s assumed In ths case there are more users than fxed voce slots assgned by the operator So, voce users need to use ondemand tme slots, and they have prorty over data users on these channels In ths case the data users can only use the fxed data tme slots and the on-demand tme slots that are not used for voce calls So, the capacty s determned c by the moble class, relaton and on-demand tme slots avalablty (nstantaneously determned by the amount of voce calls) In ths case the lnk capacty s modulated by voce traffc Number of GSM users are less or equal than fxed voce slots, the clent shares the channel wth other data users and a fxed c relaton s assumed In ths case the clent s sharng data resources wth other data users Thus, each data user does not have the channel for hs own use all the tme Ths case can be seen as a fxed capacty system (assumng a fxed number of users transmttng all the tme wth a fxed c relaton) shared n tme wth other data users Number of GSM users are hgher than fxed voce slots, the clent shares the channel wth other data users and a fxed c relaton s assumed Ths s a more realstc case whch can be seen as the superposton of the two cases mentoned before So, n ths case the lnk capacty s modulated by voce traffc and shared n tme wth other data users More complex cases A more realstc model s obtaned by the superposton of all the above mentoned varables, whch ncludes varaton of data and voce traffc and c relaton Another relevant effect s cross traffc nserted n the channel by the data clent (another knd of traffc dfferent from the probe packets that may ntroduce certan level of nose on t) The followng algorthm deals wth ths stuaton 5 ALCE: AN ALGORITHM TO ESTIMATE CELLULAR LINK CAPACITY Ths algorthm s composed by dfferent modules man modules are the followng: 1 Actvty and nactvty ntervals classfcaton 2 Analyss of each actvty nterval The A Potental capactes detecton B Process of samples for each one of the capactes detected n A 3 Parameters estmaton 51 Actvty and nactvty ntervals classfcaton In order to fnd the actvty ntervals, an adaptaton of the K-means algorthm [2] was developed The algorthm calculates K 1 thresholds and classfes the packet par nter-arrval tme nto K groups, where K s supposed to be known In our case K = 2 represents the group of samples that belong to one actvty nterval (group 1) and the group of samples that denotes a change of actvty nterval (group 2) Once the executon of the algorthm s fnshed, the selected threshold s gven by T h Kmeans = g1 + g2 2 (5)

5 Fgure 3: Experment n whch actvty ntervals are clearly denoted Fgure 4: Experment n whch there s only one actvty nterval where g 1 and g 2 are the means of the groups 1 and 2 respectvely One partcular case s when durng the experment does not occur more than one actvty nterval Ths happens when the clent has the channel for hs own use In ths case, at the moment of dstngushng between actvty ntervals, f we run the pure K-means algorthm, an ncorrect dscrmnaton s done, dentfyng some dfferences of tme between consecutve packets as nactvty ntervals In order to solve ths problem a mnmum threshold s calculated when detectng the ntervals The tme between packet arrvals depends on the packet sze and on the nstantaneous capacty, so, a mnmum threshold, T h mn, s calculated based on ths parameters Applyng ths crteron, the fnal threshold appled to dfferentate between nactvty perods s gven by equaton 6 T hm = max {T h mn, T h Kmeans } (6) Fgure 3 shows the stuaton of a common experment, n whch actvty ntervals are clearly denoted and separated by nactvty ntervals On the other hand, fgure 4 shows an experment n whch there are not any nactvty ntervals,so, the adaptaton of the K-means algorthm s necessary to obtan vald results As an example, f we run the pure K-means algorthm, fgure 5 shows how a great number of false nactvty ntervals are detected 52 Actvty nterval analyss After detectng actvty ntervals, the algorthm proceeds to analyze each one of them The flow dagram of ths module s shown n fgure Potental capactes detecton Potental capactes of each actvty nterval are detected based on kernel densty estmaton technque [16, 19] The man dea of ths technque s the followng Gven a fnte sequence of n samples, X 1,, X n, the algorthm estmates Fgure 5: Pure K-means algorthm fnds many fake nactvty ntervals the densty functon f(t) as ˆf(t) = 1 nx «t X K nh h =1 where K s a kernel functon and h s the bandwdth The kernel has the followng propertes Z (7) K(t)dt = 1, K(t) 0 (8) The Kernel used n the algorthm s the Epanechnkov Kernel, defned as where K(t) = 3 4 (1 t2 )I t <1 (9) I t <1 = j 1 f t < 1 0 n other case The optmum Epanechnkov kernel bandwdth h s gven

6 START Are ntervals? NO END YES Densty functon of the nterval Remove packets from these sub ntervals Fnd maxmums of the densty functon Mark sub ntervals wth ths capacty NO Are maxmums? Take the maxmum of greatest bandwdth avalable Fgure 7: Capacty detecton n presence of low level of nose YES Fgure 6: Flow dagram of the actvty nterval analyss by the followng equaton h opt = (40) 1/5 π 1/10 s n n 1/5 (10) where s n represents the standard devaton of the samples s n = 1 n! 1/2 nx (X X) 2 =1 (11) After the densty functon s obtaned the algorthm proceeds to fnd ts maxmums, beng these ponts the potental capactes durng the actvty nterval 522 Samples processng to avod false potental capactes detected In ths module, the algorthm evaluates f these potental capactes really correspond to an actvty nterval In order to dscard false capactes a set of rules are appled to the potental capactes For example, rules to avod capactes that are not possble n a cellular wreless lnk, rules to avod spurous measurements or rules to take nto account capacty varatons due to the lmted accuracy of the measurement procedure can be consdered At the end of ths procedure all vald capactes n the actvty nterval of study are saved The process s repeated wth the next actvty nterval untl there are no more actvty ntervals to analyze When ths module s fnshed, the algorthm executes the followng one Fgure 7 shows a common stuaton n the analyss of an actvty nterval In ths case, a great quantty of samples regster the same capacty However, the presence of certan solated samples whch are far from ths value could nduce to thnk, at frst sght, n the presence of many capactes durng the actvty nterval However, due to the rules mposed to flter spurous capactes, the algorthm dentfes these solated ponts as nvald measurements done by the Fgure 8: accuracy Capacty varatons due to tme stamps system or measures affected by cross traffc For these reasons the algorthm behaves as shown n fgure 7 In fgure 8 a partcular case s shown In ths experment the nstantaneous lnk capacty oscllates between 120 and 109 kbps Ths stuaton s probably caused by the accuracy n the tme stamps Partcularly, n ths case, the experment was done wth a packet sze of 300 bytes, whle the regstered nter-arrval tme were between 22 and 20 ms However, t s reasonable to suppose that the packets arrved at the clent at a rate between 22 and 20 ms Ths means that the real capacty s between 120 and 109 kbps It can be seen how, by the applcaton of the kernel densty estmaton, the fnal capacty s detected at 113 kbps Fgure 9 shows a case n whch the experment was done under several nose condtons As t can be seen t s not easy to fnd the real lnk capacty Under these condtons the capacty estmaton would have large uncertanty, so the algorthm does not mark any capacty

7 Fgure 9: Capacty detecton wth hgh level of nose The algorthm s not able to dstngush any capacty Fgure 10: Network measurement system 6 IMPLEMENTED MEASUREMENT SYS- TEM The mplemented measurement system conssts of a server runnng Lnux and a Servlet The clent can use an Applet (f the clent s usng a GPRS-EDGE modem) or a Mdlet (f the clent s usng a cellular phone only) Fgure 10 shows a dagram of the measurement system The system archtecture s explaned n more detal n [12] The measures are done n two phases: Phase I: Edge router deceve Phase II: Experment 61 Phase I: Edge router deceve The local GPRS-EDGE provder assgns IP addresses to ts clents from a prvate pool through an edge router applyng NAT 1 For ths reason, t s necessary to fnd a way to establsh the communcaton between the Internet server and the clent n order to make the correspondng measurements Ths frst phase deceves the edge router n order to establsh a path from the server to the clent 1 Network Address Translaton At the begnnng of the experment, ts parameters are negotated between the clent (Applet or Mdlet) and the server va HTTP packets After ths negotaton, the server begns the experment by sendng UDP probe packets wth the chosen parameters Snce the ntal request for the experment s done by the clent, the edge router regster an exchange of HTTP packets from the clent (whch has a prvate IP address) to the server (wth a publc IP address) Once ths exchange s fnshed the server starts sendng UDP packets to the clent If the server sends the UDP probe packets to the prvate clent s IP, the packets wll be dscarded by the router If the server sends the probe packets to the edge router publc IP, the packets wll be dscarded, because the router does not know whch clent has requested these packets To solve ths problem, the system mplements the deceve phase In ths phase the clent sends false probe packets to the server mmedately after the HTTP negotaton By dong ths, a regster on the NAT table of the edge router assocates an UDP flow from the clent to the server n any gven par of ports The server reads the nformaton of ths UDP packets and starts the experment by sendng the probe UDP packets to the clent usng the ports chosen by the clent n the decevng phase In ths case, when the experment packets arrve at the edge router, a record on the NAT table exsts, so the router knows that ths flow belongs to the clent - server path and routes the packets correctly 62 Phase II: Experment The experment sends UDP packets from the server to the clent n order to gather the needed nformaton to run the prevous algorthm The packets sent from the server, are rebounded at the clent and receved by the server Ths packets contan useful nformaton for the algorthm as a sequence number and the arrval tme stamps at each end of the path 7 RESULTS Durng the tral perod, many experments were done under dfferent crcumstances The varables taken nto account were the place of the experment (cell of servce), c relaton, hour of the day and the moble type Experments were done wth two mobles, Moble A and Moble B Both were used as modems, connected to a PC and usng the Applet as the clent software or as a moble clent, usng the Mdlet as the clent software The places chosen to run the experments were dfferent neghborhoods of Montevdeo (Punta Carretas, Malvín, La Blanqueada and Palermo) and a seasde (Playa Hermosa) 71 Mean capacty Table 3 shows maxmum, mean and mnmum values of capactes regstered durng the experments Punta Carretas, Palermo and Playa Hermosa (PH) were the chosen places, and the measures were done usng Moble A In these experments was observed that under normal traffc condtons mean capactes were between 190 and 220 kbps These results reveal that Moble A obtans, n general, four tme slots for download wth code scheme between MCS-6 and MCS-9 Fgure 11 shows experments made n Playa Hermosa In ths case the pattern of mean capactes on the frst three days of experments done n the afternoon were greater than

8 Place of Mean Mn Max study capacty capacty capacty (kbps) (kbps) (kbps) P Carretas Palermo PH - Afternoon PH - Nght Table 3: Mean capactes regstered by place wth Moble A Fgure 12: Mean capacty wth moble B (cross) and A (crcles) Fgure 11: Mean capacty n kbps n Playa Hermosa s cell wth Moble A the mean capactes regstered at nght Ths s because the experments were done durng a holday weekend n a seasde, and at nght the voce traffc s more mportant Also, t can be seen that ths phenomenon s not apprecated the last day of the holday, because the majorty of the people had returned to ther resdence ctes Fgure 12 shows the capacty obtaned wth both mobles n Malvín As t can be seen, mean capactes regstered wth moble B are much smaller than the ones regstered wth Moble A Dong several experments n dfferent hours and places, the nfluence of factors lke cell of servce or the tme of the experment were dscarded; then such behavor was caused by the type of moble used 72 Channel Actvty tme As mentoned n Secton 3, channel actvty tme s an ndcator of the amount of tme that the clent s usng the resources Fgure 13 shows the channel actvty tme regstered wth both mobles As t can be seen, channel actvty tme of moble B was bgger than channel actvty tme of moble A 73 RTT After the experment phase was fnshed, we concluded that the delays regstered on the network were hgh n order to provde real tme applcatons Values obtaned wth both mobles were dfferent, as t can be seen n table 4 Cell of servce also have nfluence over the RTT obtaned, because of the c relaton or the amount Fgure 13: Moble B (cross) and Moble A channel (crcle) actvty tme of traffc on t, as table 5 shows 74 Jtter From the experments done we conclude, as expected, that regstered jtter s tghtly related to RTT Table 6 shows values obtaned n dfferent places Ths range of values ental that certan servces whch requre low jtter values, lke Push To Talk, suffer a hgh degradaton of performance 75 Packets loss The regstered loss n the majorty of cases was between 0 and 4 % of packets sent However, n some experments ths rato was above 10 %

9 Moble Mean Mn Max used RTT (ms) RTT (ms) RTT (ms) Moble A Moble B Place of Mean Mn Max study Jtter (ms) Jtter (ms) Jtter (ms) P Hermosa P Carretas Table 4: Regstered RTT n Punta Carretas cell wth both mobles Table 6: Jtter obtaned n dfferent places wth moble A Place of Mean Mn Max study RTT (ms) RTT (ms) RTT (ms) P Hermosa P Carretas INTERNET Rado base staton GPRS-EDGE Clent Table 5: RTT obtaned n dfferent places wth moble A 8 THROUGHPUT VS CAPACITY: INFLU- ENCE OF THE TRANSPORT LAYER PRO- TOCOL AND THE ROUND TRIP TIME The prevous secton analyzes the cellular lnk capacty and other mportant performance parameters The focus of ths secton s on the throughput The throughput s an mportant parameter at the applcaton layer Even f the system has hgh capacty, such capacty can not be used unless a hgh throughput s acheeved Lnk throughput s an estmator of data transfer rate that an applcaton can acheve, whereas capacty refers to the real physcal capacty of the access medum Takng these consderatons nto account, the maxmum throughput that an user could acheve s equal to the lnk capacty There are many parameters that nfluence the throughput The capacty of the bottleneck lnk s an mportant parameter, but the RTT and the transport layer protocol have an mportant nfluence too In our experments the throughput obtaned by a GPRS- EDGE connecton s n many cases, more than two tmes lower than the bottleneck lnk capacty The problem to analyze s why there s such a bg dfference Wth ths purpose, several measures have been done drectly on the net, usng dfferent knds of traffc between a server and a moble c clent Fgure 14 shows the topology used on the experments The clent has a GPRS-EDGE modem, whle n the other sde of the communcaton resdes an FTP server, from whch dfferent fle transfers and measurements have been done All measurements have been done late at nght Ths perod was chosen n order to assume a low charge of the cellular network relaton was hgh enough to ensure that durng all the experments use EDGE channels wth hgh MCS Wth these assumptons, t s supposed that the clent wll acheve hgh transfer rates 81 Study of throughput for TCP traffc n the downlnk In ths experment multple large fles were downloaded, studyng acheved throughput by the user (fgure 15) To do such measurements we have used a traffc snf- FTP Server Fgure 14: Measurement topology fer on users termnal (Ethereal) and a software that montors the rate of bts that arrves to the modem (NetStat Lve) At frst, one download was done, studyng statonary acheved throughput Then the number of smultaneous downloads was ncreased, studyng agan the aggregated statonary throughput Ths procedure was contnued untl aggregated throughput stop rsng 82 Study of capacty and throughput n uplnk for dfferent types of traffc In ths experment a tool for capacty estmaton was used, Iperf Ths tool s based on TCP and UDP traffc n order to measure real uplnk capacty and acheved uplnk throughput for the clent for dfferent knds of traffc Estmatons obtaned wth ths tool depend on the knd of traffc whch s used In the case that ths traffc s UDP, estmaton conssts n sendng one or more bursts of UDP flows from the clent to the server, floodng the lnk and analyzng the packets n the server, as shown n fgure 16 In case that ths traffc s TCP, one or more of TCP connectons are opened, determnng aggregated throughput at the server, as shown n fgure Results 831 Study of throughput for TCP traffc n the downlnk The number of FTP transferences done, n chronologcal order, was: 1 fle, 2 fles, 3 fles, 5 fles, 1 fle, 4 fles and 5 fles Fgure 17 shows the acheved throughput for each case Table 7 shows acheved throughput n the experment varyng the number of FTP transferences Ths experment shows how the acheved throughput from a sngle TCP connecton dd not reach channel capacty The lnk capacty s around 180 kbps, because the moble was usng 3 slots for download (3+2 confguraton) Ths case shows that one connecton can acheve only a thrd of

10 FTP N FTP 2 INTERNET FTP 1 GPRS-EDGE Clent Fgure 15: Downlnk TCP throughput FTP Server Numb of FTP Throughput transferences (kbps) 1 58,3 2 96, , ,5 1 64, , ,5 Iperf clent UDP Flow Iperf server Table 7: Throughput estmaton through smultaneous FTP downloads INTERNET Server traffc and dfferent number of connectons/flows GPRS-EDGE Clent Fgure 16: Uplnk throughput the lnk capacty However, ths value could be ncreased by openng some smultaneous connectons For fve smultaneous connectons acheved throughput s close to the lnk capacty It s known that TCP throughput cannot be equal to the lnk capacty because ts congeston control algorthm decreases the throughput However, n ths case the dfference seems to be mportant The problem s that TCP throughput s nversely proportonal to the RTT [13] As t can be seen n Table 5, n all cases the RTT s hgh compared to usual values obtaned n typcal wred lnks The RTT s normally hgh n cellular networks and ths value generates the small throughput that can be obtaned by one connecton 832 Study of capacty and throughput n uplnk for dfferent types of traffc Tables 8 and 9 summarzes estmatons for both knds of Number of TCP Estmaton connectons (kbps) 1 56,3 2 74,2 3 91,5 Table 8: Estmaton of uplnk capacty wth Iperf usng TCP connectons Number of UDP flows Estmaton flows (kbps) Table 9: Estmaton of uplnk capacty wth Iperf usng UDP flows Throughput (kbps) T = 135,6 kbps T = 96,1 kbps T = 161,5 kbps T = 58,3 kbps T = 64,8 kbps 40 Fgure 17: Downlnk throughput durng the experment T = 146,2 kbps T = 158,5 kbps Samples To analyze the results, t s mportant to consder the characterstcs of the dfferent knds of traffc In the case of UDP traffc, estmatons are equal to the uplnk capacty, ndependently of the number of flows In the case of TCP traffc, all the results obtaned were the same as n downlnk, only one connecton acheved a lower throughput than a few smultaneous connectons In ths sense, capacty estmaton usng TCP traffc s not recommended For ths reason, t was mplemented n the system end-to-end measurements usng UDP packets 9 CONCLUSIONS In ths work we have ntroduced both, an end-to-end measurement system and a specfc algorthm to measure performance parameters n TDMA based IP networks, partcularly on GPRS-EDGE Ths algorthm has the partcularty of beng specfcally desgned for the analyss of the GPRS-

11 EDGE protocol, obtanng bg amounts of nformaton for t Several experments have been done n order to test the robustness of the system and the algorthm, obtanng good results Due to ths results we have done an extensve measurement on a GPRS-EDGE network, gettng to know ts man characterstcs The developed system can be used through any GPRS- EDGE network The only requrement s to have a Java Vrtual Machne nstalled on the clent (n case that the clent s connected to the GPRS-EDGE network through a modem) or a Java capable moble 10 ACKNOWLEDGMENTS Ths work was supported by the Programa de Desarrollo Tecnologco (PDT), project S/C/OP/46/03, MetroNet II The authors would lke to thank ANTEL (Admnstracón Naconal de Telecomuncacones), and Laura Asprot for all the support gven to the project 11 REFERENCES [1] M Adler, T Bu, R Staraman, and D Towsley Tree layout for nternal network characterzatons n multcast networks NGC 01: Proceedngs of the Thrd Internatonal COST264 Workshop on Networked Group Communcaton, pages , 2001 [2] F Bon Técncas no supervsadas Métodos de agrupamento course notes from unversdad de granada 2001 [3] R Cáceres, N G Duffeld, Horowtz, and D Towsley Multcast-based nference of networknternal loss characterstcs IEEE Transactons on Informaton Theory Vol 45, pages , 1999 [4] C Dovrols, P Ramanathan, and D Moore What do packet dspersson technques measure? Infocom, pages , 2001 [5] A Downey Usng pathchar to estmate nternet lnk characterstcs Measurement and Modelng of Computer Systems, pages , 1999 [6] V Jacobson Pathchar, a tool to nfer characterstcs of nternet path Presented at the mathematcal scences research nsttute 1997 [7] M Jan and C Dovrols Pathload: A measurement tool for end-to-end avalable bandwdth Proceedngs of Passve and Actve Measurements (PAM), pages 14 25, 2002 [8] M Jan and C Dovrols Pathload: A measurement tool for end-to-end avalable bandwdth In Proceedngs of Passve and Actve Measurements (PAM) Workshop, 2002 [9] M Jan and C Dovrols End-to-end avalable bandwdth: measurement methodology, dynamcs, and relaton wth TCP throughput IEEE/ACM Transactons n Networkng, 2003 [10] K La and M Baker Nettmer: A tool for measurng bottleneck lnk bandwdth Proceedngs of the USENIX Symposum on Internet Technologes and Systems, 2001 [11] E Lawrence, G Mchalds, and V N Nar Inference of network delay dstrbutons usng the EM algorthm Techncal Report, Unversty of Mchgan, 2003 [12] J A Negrera, J Perera, and S Pérez MetroCel: Estmacón de performance sobre enlaces GPRS-EDGE, javerp/metrocel [13] J Padhye, V Frou, D Towsley, and J Kurose Modelng TCP throughput: A smple model and ts emprcal valdaton Proceedngs of the ACM SIGCOMM 98 conference on applcatons, technologes, archtectures, and protocols for computer communcaton, pages , 1998 [14] F L Prest, N G Duffeld, J Horowtz, and D Towsley Multcast-based nference of network-nternal delay dstrbutons ACM/IEEE Transactons on Networkng Vol 10, pages , 2002 [15] V Rbero, R Red, R Baranuk, J N J, and L Cotrell PathChrp: Effcent avalable bandwdth estmaton for network paths Passve and Actve Measurement Workshop, 2003 [16] B Slverman Densty estmaton for stadstcs and data analyss 1986 [17] J Strauss, D Katab, and F Kaashoek A measurement study of avalable bandwdth estmaton tools Internet Measurement Workshop, Proceedngs of the 2003 ACM SIGCOMM conference on Internet measurement, pages 39 44, 2003 [18] Y Tsang, M Coates, and R Nowak Network delay tomography IEEE Transactons on Sgnal Processng Vol 51, pages , 2003 [19] B A Turlach Bandwdth selecton n kernel densty estmaton A revew, Dscusson Paper 9317, Insttut de Statstque, Voe du Roman Pays 34, B-1348 Louvan-la-Neuve, Belgum, 1993

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems

A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems roceedngs of the 7th World Congress The Internatonal Federaton of Automatc Control A assve Network Measurement-based Traffc Control Algorthm n Gateway of 2 Systems Ybo Jang, Weje Chen, Janwe Zheng, Wanlang

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

Conferencing protocols and Petri net analysis

Conferencing protocols and Petri net analysis Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

Activity Scheduling for Cost-Time Investment Optimization in Project Management

Activity Scheduling for Cost-Time Investment Optimization in Project Management PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays VoIP Playout Buffer Adjustment usng Adaptve Estmaton of Network Delays Mroslaw Narbutt and Lam Murphy* Department of Computer Scence Unversty College Dubln, Belfeld, Dubln, IRELAND Abstract The poor qualty

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

How To Detect An 802.11 Traffc From A Network With A Network Onlne Onlnet

How To Detect An 802.11 Traffc From A Network With A Network Onlne Onlnet IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, XXX 2008 1 Passve Onlne Detecton of 802.11 Traffc Usng Sequental Hypothess Testng wth TCP ACK-Pars We We, Member, IEEE, Kyoungwon Suh, Member, IEEE,

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection Stochastc Protocol Modelng for Anomaly Based Network Intruson Detecton Juan M. Estevez-Tapador, Pedro Garca-Teodoro, and Jesus E. Daz-Verdejo Department of Electroncs and Computer Technology Unversty of

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS Yumng Jang, Chen-Khong Tham, Ch-Chung Ko Department Electrcal Engneerng Natonal Unversty Sngapore 119260 Sngapore Emal: {engp7450,

More information

Selecting Test Signals for Successful Impairment Classification in VoIP Systems

Selecting Test Signals for Successful Impairment Classification in VoIP Systems 16 th IMEKO TC4 Symposum Sept. 22-24, 28, Florence, Italy Selectng Test Sgnals for Successful Imparment Classfcaton n VoIP Systems Dors Bao 1,2, Luca De Vto 1, Sergo Rapuano 1 1 Dept. of Engneerng, Unversty

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network On Fle Delay Mnmzaton for Content Uploadng to Meda Cloud va Collaboratve Wreless Network Ge Zhang and Yonggang Wen School of Computer Engneerng Nanyang Technologcal Unversty Sngapore Emal: {zh0001ge, ygwen}@ntu.edu.sg

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

taposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com

taposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com G. G. Md. Nawaz Al 1,2, Rajb Chakraborty 2, Md. Shhabul Alam 2 and Edward Chan 1 1 Cty Unversty of Hong Kong, Hong Kong, Chna taposh_kuet20@yahoo.comcsedchan@ctyu.edu.hk 2 Khulna Unversty of Engneerng

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

ivoip: an Intelligent Bandwidth Management Scheme for VoIP in WLANs

ivoip: an Intelligent Bandwidth Management Scheme for VoIP in WLANs VoIP: an Intellgent Bandwdth Management Scheme for VoIP n WLANs Zhenhu Yuan and Gabrel-Mro Muntean Abstract Voce over Internet Protocol (VoIP) has been wdely used by many moble consumer devces n IEEE 802.11

More information

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

VoIP over Multiple IEEE 802.11 Wireless LANs

VoIP over Multiple IEEE 802.11 Wireless LANs SUBMITTED TO IEEE TRANSACTIONS ON MOBILE COMPUTING 1 VoIP over Multple IEEE 80.11 Wreless LANs An Chan, Graduate Student Member, IEEE, Soung Chang Lew, Senor Member, IEEE Abstract IEEE 80.11 WLAN has hgh

More information

An Introduction to 3G Monte-Carlo simulations within ProMan

An Introduction to 3G Monte-Carlo simulations within ProMan An Introducton to 3G Monte-Carlo smulatons wthn ProMan responsble edtor: Hermann Buddendck AWE Communcatons GmbH Otto-Llenthal-Str. 36 D-71034 Böblngen Phone: +49 70 31 71 49 7-16 Fax: +49 70 31 71 49

More information

A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers

A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers Journal of Computatonal Informaton Systems 7: 13 (2011) 4740-4747 Avalable at http://www.jofcs.com A Load-Balancng Algorthm for Cluster-based Mult-core Web Servers Guohua YOU, Yng ZHAO College of Informaton

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

) of the Cell class is created containing information about events associated with the cell. Events are added to the Cell instance

) of the Cell class is created containing information about events associated with the cell. Events are added to the Cell instance Calbraton Method Instances of the Cell class (one nstance for each FMS cell) contan ADC raw data and methods assocated wth each partcular FMS cell. The calbraton method ncludes event selecton (Class Cell

More information

QoS-Aware Active Queue Management for Multimedia Services over the Internet

QoS-Aware Active Queue Management for Multimedia Services over the Internet QoS-Aware Actve Queue Management for Multmeda Servces over the Internet I-Shyan Hwang, *Bor-Junn Hwang, Pen-Mng Chang, Cheng-Yu Wang Abstract Recently, the multmeda servces such as IPTV, vdeo conference

More information

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng

More information

DBA-VM: Dynamic Bandwidth Allocator for Virtual Machines

DBA-VM: Dynamic Bandwidth Allocator for Virtual Machines DBA-VM: Dynamc Bandwdth Allocator for Vrtual Machnes Ahmed Amamou, Manel Bourguba, Kamel Haddadou and Guy Pujolle LIP6, Perre & Mare Cure Unversty, 4 Place Jusseu 755 Pars, France Gand SAS, 65 Boulevard

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

A DATA MINING APPLICATION IN A STUDENT DATABASE

A DATA MINING APPLICATION IN A STUDENT DATABASE JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul

More information

Network Services Definition and Deployment in a Differentiated Services Architecture

Network Services Definition and Deployment in a Differentiated Services Architecture etwork Servces Defnton and Deployment n a Dfferentated Servces Archtecture E. kolouzou, S. Manats, P. Sampatakos,. Tsetsekas, I. S. Veners atonal Techncal Unversty of Athens, Department of Electrcal and

More information

A New Quality of Service Metric for Hard/Soft Real-Time Applications

A New Quality of Service Metric for Hard/Soft Real-Time Applications A New Qualty of Servce Metrc for Hard/Soft Real-Tme Applcatons Shaoxong Hua and Gang Qu Electrcal and Computer Engneerng Department and Insttute of Advanced Computer Study Unversty of Maryland, College

More information

Dynamic Fleet Management for Cybercars

Dynamic Fleet Management for Cybercars Proceedngs of the IEEE ITSC 2006 2006 IEEE Intellgent Transportaton Systems Conference Toronto, Canada, September 17-20, 2006 TC7.5 Dynamc Fleet Management for Cybercars Fenghu. Wang, Mng. Yang, Ruqng.

More information

Multi-Source Video Multicast in Peer-to-Peer Networks

Multi-Source Video Multicast in Peer-to-Peer Networks ult-source Vdeo ultcast n Peer-to-Peer Networks Francsco de Asís López-Fuentes*, Eckehard Stenbach Technsche Unverstät ünchen Insttute of Communcaton Networks, eda Technology Group 80333 ünchen, Germany

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

Relay Secrecy in Wireless Networks with Eavesdropper

Relay Secrecy in Wireless Networks with Eavesdropper Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY 14853 Emal : {pv45, th255,

More information

Properties of Indoor Received Signal Strength for WLAN Location Fingerprinting

Properties of Indoor Received Signal Strength for WLAN Location Fingerprinting Propertes of Indoor Receved Sgnal Strength for WLAN Locaton Fngerprntng Kamol Kaemarungs and Prashant Krshnamurthy Telecommuncatons Program, School of Informaton Scences, Unversty of Pttsburgh E-mal: kakst2,prashk@ptt.edu

More information

Vembu StoreGrid Windows Client Installation Guide

Vembu StoreGrid Windows Client Installation Guide Ser v cepr ov dered t on Cl enti nst al l at ongu de W ndows Vembu StoreGrd Wndows Clent Installaton Gude Download the Wndows nstaller, VembuStoreGrd_4_2_0_SP_Clent_Only.exe To nstall StoreGrd clent on

More information

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA ) February 17, 2011 Andrew J. Hatnay ahatnay@kmlaw.ca Dear Sr/Madam: Re: Re: Hollnger Canadan Publshng Holdngs Co. ( HCPH ) proceedng under the Companes Credtors Arrangement Act ( CCAA ) Update on CCAA Proceedngs

More information

Rapid Estimation Method for Data Capacity and Spectrum Efficiency in Cellular Networks

Rapid Estimation Method for Data Capacity and Spectrum Efficiency in Cellular Networks Rapd Estmaton ethod for Data Capacty and Spectrum Effcency n Cellular Networs C.F. Ball, E. Humburg, K. Ivanov, R. üllner Semens AG, Communcatons oble Networs unch, Germany carsten.ball@semens.com Abstract

More information

Canon NTSC Help Desk Documentation

Canon NTSC Help Desk Documentation Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent

More information

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,

More information

Implementation of Deutsch's Algorithm Using Mathcad

Implementation of Deutsch's Algorithm Using Mathcad Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

MAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11

MAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11 Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, 008 MAC Layer Servce Tme Dstrbuton of a Fxed Prorty Real Tme Scheduler over 80. Inès El Korb Ecole Natonale des Scences de

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

Sangam - Efficient Cellular-WiFi CDN-P2P Group Framework for File Sharing Service

Sangam - Efficient Cellular-WiFi CDN-P2P Group Framework for File Sharing Service Sangam - Effcent Cellular-WF CDN-P2P Group Framework for Fle Sharng Servce Anjal Srdhar Unversty of Illnos, Urbana-Champagn Urbana, USA srdhar3@llnos.edu Klara Nahrstedt Unversty of Illnos, Urbana-Champagn

More information

CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS

CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS Novella Bartoln 1, Imrch Chlamtac 2 1 Dpartmento d Informatca, Unverstà d Roma La Sapenza, Roma, Italy novella@ds.unroma1.t 2 Center for Advanced

More information

EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP. Kun-chan Lan and Tsung-hsun Wu

EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP. Kun-chan Lan and Tsung-hsun Wu EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP Kun-chan Lan and Tsung-hsun Wu Natonal Cheng Kung Unversty klan@cse.ncku.edu.tw, ryan@cse.ncku.edu.tw ABSTRACT Voce over IP (VoIP) s one of

More information

Modeling and Analysis of 2D Service Differentiation on e-commerce Servers

Modeling and Analysis of 2D Service Differentiation on e-commerce Servers Modelng and Analyss of D Servce Dfferentaton on e-commerce Servers Xaobo Zhou, Unversty of Colorado, Colorado Sprng, CO zbo@cs.uccs.edu Janbn We and Cheng-Zhong Xu Wayne State Unversty, Detrot, Mchgan

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton

More information

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.

More information

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET)

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET) Renforcement Learnng for Qualty of Servce n Moble Ad Hoc Network (MANET) *T.KUMANAN AND **K.DURAISWAMY *Meenaksh College of Engneerng West K.K Nagar, Cheena-78 **Dean/academc,K.S.R College of Technology,Truchengode

More information

Efficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ

Efficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ Effcent Strpng Technques for Varable Bt Rate Contnuous Meda Fle Servers æ Prashant J. Shenoy Harrck M. Vn Department of Computer Scence, Department of Computer Scences, Unversty of Massachusetts at Amherst

More information

Research of concurrency control protocol based on the main memory database

Research of concurrency control protocol based on the main memory database Research of concurrency control protocol based on the man memory database Abstract Yonghua Zhang * Shjazhuang Unversty of economcs, Shjazhuang, Shjazhuang, Chna Receved 1 October 2014, www.cmnt.lv The

More information

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments Tamkang Journal of Scence and Engneerng, Vol. 12, No. 2, pp. 143149 (2008) 143 Performance Analyss and Comparson of QoS Provsonng Mechansms for CBR Traffc n Nosy IEEE 802.11e WLANs Envronments Der-Junn

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

Software project management with GAs

Software project management with GAs Informaton Scences 177 (27) 238 241 www.elsever.com/locate/ns Software project management wth GAs Enrque Alba *, J. Francsco Chcano Unversty of Málaga, Grupo GISUM, Departamento de Lenguajes y Cencas de

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Peer-to-Peer Networks Protocols, Cooperation and Competition

Peer-to-Peer Networks Protocols, Cooperation and Competition Peer-to-Peer Networks Protocols, Cooperaton and Competton Hyunggon Park Sgnal Processng Laboratory (LTS4), Insttute of Electrcal Engneerng, Swss Federal Insttute of Technology (EPFL), Lausanne, Swtzerland

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information