Comparison of Mesh Protection and Restoration Schemes and the Dependency on Graph Connectivity

Size: px
Start display at page:

Download "Comparison of Mesh Protection and Restoration Schemes and the Dependency on Graph Connectivity"

Transcription

1 Comparison of Mesh Protection and Restoration Schemes and the Dependency on Graph Connectivity John Doucette, Wayne D. Grover TRLabs, # Avenue, Edmonton, Alberta, Canada T5K P7 and Department of Electrical and Computer Engineering, University of Alberta, Edmonton, Alberta Contact: {doucette, Abstract We present a series of experimental designs based on different mesh survivability principles and study ho the orking and spare capacity requirements of each netork type vary ith the netork average nodal degree or notionally, the connectivity of the facilities graph of the netork. This is accompanied by an attempt at some simple theories for bounding or estimating ho capacity and redundancy ill depend on netork average nodal degree. Six types of restorable mesh netork designs are compared: + non-shared backup path protection, span restoration ith and ithout oint optimization of orking and spare paths, chain-optimized span restoration, shared backup path protection, and true dynamic path restoration. It is thought that this may be the first comprehensive comparative study of restorable mesh netork capacity requirements vieed across a range of netork degree as opposed to point comparisons of capacity on single study netorks. By shoing ho each scheme responds to the degree of connectivity of the facilities graph the ork also provides ne insights about facilities graph topology evolution. Keyords Spare Capacity Allocation, Protection & Restoration Algorithms, Netork Planning and Optimization, Transport Netorks, Netork Design Theory I. INTRODUCTION This ork provides a study of six different types of mesh-restorable netork design in terms of ho their orking and spare capacity varies ith graph connectivity. We also compare the experimental behaviour to that predicted by a loer bound and to estimators for ho netork average nodal degree affects capacity requirements. One of the loer bounds is the ell-knon /( d -) argument (here d is the average netork nodal degree) for the minimal ratio of spare to orking capacity from an end-node limited restoration standpoint. The others are ne approaches, not strictly bounds hoever, that try to take into account both the average nodal degree, and the disparity of the orking capacity values incident to each node. The ork on capacity versus nodal degree and the attempts at ne bounding or estimation theories are part of a larger ongoing effort toards optimizing the basic facilities graph topology of restorable mesh netorks []. The types of mesh-restorable netorks characterized and the short-form names used are listed here. More details of each follo in Section III. Schemes are compared on the basis of design to ensure restorability against any single complete span cut. A span is defined as the set of all orking and spare capacity beteen adacent cross-connecting nodes that undergoes a common-cause failure arising from damage to a single physical-layer entity such as a duct or cable. No changes are made to unaffected orking paths in any of these schemes. (i) + Path Protection (+ APS): These are mesh netorks on hich the shortest path route is used as a orking path and an equal amount of capacity is reserved in a non-shared manner on the next shortest fully disoint route. This is really a demand-level + APS or, in other parlance, an SNCP ring protection scheme. + APS is included as a benchmark for the highest end of the capacity consumption scale and because it seems (perhaps surprisingly) to be often assumed as the survivability scheme in different studies of mesh netorks. + APS requires only a tail-end selection sitch for protection and is therefore the simplest and fastest scheme in terms of the real time mechanism. Its simplicity is operationally attractive but e ant to make sure its capacity requirements are fully appreciated in contrast to other mesh survivability schemes. (ii) Span Restoration Spare Capacity Assignment (SCA): These are span-restorable netorks in hich demands are shortest-path routed folloed by optimal spare capacity assignment for 00% restorability against any complete span cut. The total spare capacity is minimized independently of orking capacity, hich is generated by the shortest-path demand routing. (iii) Span Restoration Joint Capacity Assignment (JCA): These are span-restorable netorks here the routing of orking paths is ointly optimized ith spare capacity assignment to minimize total capacity.

2 (iv) Meta-Mesh (M-M): These are a ne class of span-restorable netorks in hich orking and spare capacity is ointly optimized and chain-subnetorks are provided ith logical express bypass routes. Span restoration occurs logically in the meta-mesh abstraction of the complete netork (a homeomorphism of the full graph ith no degree- nodes). The logical bypass spans on chains allos a significant reduction of the otherise required loopback spare capacity ithin chains. The concept and design of these so-called meta-mesh (M-M) netorks is treated in detail in a companion paper []. Meta-mesh netorks are based on the hypothesis that span restoration on the meta-mesh graph is close to path restoration on the full graph. SCA, JCA, and M-M netorks all employ a dynamic span restoration mechanism hich constructs a replacement path-set beteen the immediate end-nodes of a failure span. Spontaneous self-organizing methods for this type of restoration, including distributed pre-planning, are ell developed and available from ork in the 990s [3]. Alternately, centralized control or OSPF-type path finding may be iterated to develop a set of k-shortest replacement paths for this type of restoration [4]. (v) Shared Backup Path Protection (SBPP): In these netorks the shortest route is used for the orking path, and a single fully-disoint route is selected for the backup path so as to permit efficient sharing of spare capacity on spans of the backup route over orking paths that are disoint. Traffic on orking paths that follo physically disoint routes over the netork ill not need the restoration capacity simultaneously, hence restoration capacity sharing is permitted. This is logically the same scheme as as proposed for ATM Backup VP restoration [5] in the special case here the maximum permissible over-subscription factor [6] is limited to.0. This approach is receiving attention in recent IETF deliberations [7] so it is timely to characterize it in this study. The restoration mechanism requires a signalling phase from each tail-end sitch to confirm availability of the backup route and to seize and cross-connect capacity to activate the backup path. (vi) True Path Restoration (Path): In a netork based on path restoration (as opposed to path protection as in + APS or SBPP), a centralized or self-organizing re-routing mechanism [8] deploys a collectively co-ordinated set of replacement paths for all affected origin-destination (O-D) node pairs in response to the specific failure that has occurred. The main difference relative to SBPP is that there is not a single predetermined restoration route for each orking path and that surviving portions of failed paths can implicitly be re-used for restoration. Ideal path restoration is equivalent to a multi-commodity maximum-flo (MCMF) solution for replacement of the failed orking paths ithin the surviving spare capacity [8]. II. BOUNDS AND ESTIMATORS FOR MESH CAPACITY EFFICIENCY In this section e develop a loer bound and to estimators for the redundancy of a span-restorable mesh netork. These are developed from arguments about the conditions for restorability local to any one isolated node ithin a spanrestorable netork. The results are only bounds or estimators because they predict necessary but not assuredly sufficient capacity conditions for the netork as a hole to be 00% restorable. On the other hand, e kno experimentally that at least for span-restorable netorks, the restoration flo is almost alays limited by the total spare capacity incident to one or the other end-nodes. Such end node limiting suggests that the conditions at the end-nodes may therefore provide the basis for a good bound or approximator, at least for the span-restorable case. Somehat similar end-ode limited conditions can also be considered for path-restorable netorks here the end nodes are the O-D nodes of each demand pair affected by a failure [9]. The three derivations all make use of Figure, hich shos a node of degree d in isolation. It makes use of a convention that the indexing of span numbers is in order of largest to smallest orking capacity, so denotes the orking capacity of the span ith the most orking capacity, is the second largest, etc. W S W W W 3 S 3 W... d... S d Figure : Basis for the nodal bound derivations.

3 A. Topological /(d -) Loer Bound Many people are already familiar ith the /( d -) result as an intuitive basis for ho redundancy should drop as connectivity increases. We have had frequent requests to see the basis for this result, hoever, so here e give the simple steps leading to it and e ill use it later in our analysis. Treating the /( d -) bound also sets a context for our attempts at to further approximating measures that follo. Consider the failure of span having orking capacity at the node of degree d in Figure. Obviously the node must have enough spare capacity on the other spans { d} to permit restoration of. Similarly (in the absence of higher netork-level considerations that may still add more spare capacity), each span i requires for its restoration that the total amount of spare capacity on surviving spans meets or exceeds the orking capacity on the failed span. It follos that in the best case from an efficiency standpoint, every span incident on this node could have i = and spare capacity ould be distributed evenly on all spans, in hich case the ratio of spare to orking capacity (hich e call the redundancy) becomes Bound : s (.. d) = d /( d ) = () d d (.. d) B. Estimators that Consider Working Capacity Disparity Effects We can no take the isolated nodal considerations a step farther to obtain to forms of estimator that also give us some insight as to ho the i values affect the achievable redundancy. Let us consider the largest span and the second largest and rite the corresponding sums of surviving spare capacity, and then add the resulting inequalities: s + s + + s s + s + + s 3 d 3 d s + s + ( s + + s ) + 3 d This tells us that + is therefore itself an estimated upper bound on the total required spare capacity at the node (because s and s are present directly in the sum and the total of all other spare capacity is accounted for tice). So for an estimator on redundancy that does not assume that all spans have i = as for the first bound, e could take the above over-estimate of the total spare capacity and combine it ith an optimistic vie of the total orking capacity at the node. The most optimistic case for the latter, here all i are not simply equal, ould be for all i : i ; i to be equal to. Then, the ratio of spare to orking capacity becomes Estimator : si + i (... d) + = (3) + + ( d ) i + ( d ) i (... d) If e assert = as a limiting case ( < is ruled out by definition of largest and second largest) this result returns /d hich is not as tight as /(d-). But in the more general case here >, Eq. (3) shos ho disparity in the i values and the topology measure d both affect the achievable efficiency. In particular it shos that as / (and by implication / i at the node) a ring-like redundancy of 00% is required regardless i of nodal degree. This is an important further understanding of hat affects efficiency in a mesh-restorable netork: it says that even ith a high nodal degree, if virtually all the orking capacity is on one span, then the spare capacity hoever it is distributed over the other spans still sums to. With no other orking capacity present to share that spare capacity, e get ring-like redundancy in the orst case. Overall this gives a characteristic behavioural model of tendencies in a span-restorable mesh netork. The netork s redundancy can only approach /( d -) if all orking quantities are balanced. And regardless of nodal degree, redundancy could range up to 00% as the disparity of orking capacity values increases. Thus, hat e are ideally seeking in a span-restorable mesh is high average nodal degree and balanced orking capacities at the nodes. Another basis for an estimator of spare capacity at a node is to start by assuming a uniform allocation of spare capacity for the restoration of span over all other spans. First consider the failure of span, having orking 3 ()

4 capacity, again ith reference to Figure. The node must have enough spare capacity on the other spans..d to permit restoration of. Therefore, in the absence of netork-level considerations that may further influence the distribution of spare capacity over these spans, let us assume an equal (fractional if need be) assignment to each other span of s = /( d ). Next e need to treat the failure of span, having... d orking capacity. In the absence of having made any assignment of spare capacity to span, the surviving spare capacity available for restoration of span is: d =. Therefore the spare capacity e need to add to span to make span restorable is: d d d d Case : Zero if d d or Case : d > d if Note the folloing interesting implication: that by making spans and fully restorable (under this uniform allocation approach) all spans at the node are also restorable. The reasoning is as follos: the surviving spare capacity at the node after span fails is adequate to restore span. The drop in available spare capacity at the node due to any other span failure is no more than /(d-). But the Case consideration (in Eq. 4) places enough extra spare capacity on span to restore span. Since span is restorable, all other spans not considered, but hich have loer orking capacity than span, and no more spare capacity than span must therefore also be restorable ithin the spare capacity on all other surviving spans including span. Another interesting implication is that depending on the nodal degree and the values of and, span may not require any spare capacity. In such a case, the total spare capacity of the node ill be exactly itself. That is, si = if d i (... d) d. Otherise d si = + = + i (... d) d d if d > d. In summary, this can be expressed as: i (... d) si = max, + d To estimate redundancy from this e can divide by the best case + + ( d ) or the orst case +. Using the former (and making parametric in / ), the ratio of spare to orking capacity becomes Estimator : (4) (5) si max, i (.. d) d i (.. d) i = + + d (6) III. STUDY METHODOLOGY We ill hold the bound and estimator results for later comparison against the detailed design results. We no document the methods for design of test netorks to characterize each of the six mesh survivability schemes. A. Test Netorks Tests ere conducted on a family of 8 progressively sparser test netorks derived from a single high-degree master netork. The series of 8 trials provides a reasonably continuous variation of d hile keeping all nodal positions and the end-to-end demand pattern common over all test netorks. The master netork had 3 nodes and 5 spans for a netork average nodal degree of d = 3.8. The 7 progressively sparser netorks ere derived from it by random removal of one span at a time subect to retaining bi-connectivity. The length and cost of each span is taken as the Euclidean distance on the plane beteen the end nodes of the span. A diagram of the master netork and samples of the progressively sparser test cases are available in a companion paper at this conference []. B. Demand Pattern All test case designs served a demand matrix that as made up according to a gravity attraction model ithout any inverse distance effect. The measure for attraction as the degree of the node in the master netork as a surrogate for demographic importance. There ere a total of C = 496 O-D node pairs, each exchanging an average demand of

5 units, for a total of 856 demand units. There ere no zero-demand pairs. The minimum demand as 5 units and the maximum demand as units. The flat distribution of demand intensities over distance is meant to reflect the type of demand pattern attributed to Internet traffic flos here transactions are as likely to be to a server halfay around the orld as to a server in the same city. In further ork not included due to space, other demand patterns have been tested but sho only second-order effects on the relative comparison of the capacity required by the different schemes. C. Mesh Netork Design and Solution Methods In this section e document the design method for each of the six types of mesh-survivable netorks compared. All netork designs ere produced through AMPL optimization models solved ith the Parallel CPLEX 6 MIP Solver (for SCA, JCA, and meta-mesh designs) and the Parallel CPLEX 7. MIP Solver (all other designs). Space does not permit detailed presentation of each design formulation, but most are documented in already published sources. The SCA and JCA designs ere produced using the formulations and solution method detailed in [0] except that for this study the modularity as one capacity unit (e.g. one avelength). The path-restorable designs ere based on the formulation given in [9]. The case used here is non-modular capacity path restoration ith stub release but ithout oint optimization of orking path routes. The non-oint path restorable version is more computationally practical and e kno from prior ork in [9] and elsehere [] that hile ointness increases the efficiency of span restoration significantly, path restoration designs benefit much less from the added aspect of oint optimization. The meta-mesh designs are basically a oint span-restorable capacity placement type of solution ith a special treatment of chains of degree- nodes to reduce the spare capacity requirement in the chains. The meta-mesh design method is documented in []. The + path protection designs do not strictly require an optimization model. They can be generated simply by routing programs that first find the shortest route and then the next shortest disoint route by temporary removal of all spans on the first route from the graph. We are not yet aare of a prior publication of the SBPP optimization model so the formulation e used is given here: SBPP: Minimize s C b Subect to: x = b R r r r Di b Rr S b r xr d s 5 (7) r D (8) (, i ) S : i (9) The obective (Eq. 7) minimizes the total cost of spare capacity for backup paths. S is the set of all spans, s is the number of spare capacity units placed on span, and C is the cost per spare unit placed on span. Constraints in Eq. 8 restrict us to only one backup route b per demand pair r. D is the set of all O-D pairs. R r is the set of all possible backup routes for demand pair r. d r is the number of demand units exchanged beteen demand pair r. Note that in this model, all d r orking paths on relation r are moved together upon failure to the same backup route. x r b is a /0 decision variable taking the value of if backup route b for demand pair r is used, and zero otherise. Constraints in Eq. 9 assign sufficient spare capacity on each span to accommodate all backup paths simultaneously crossing the span for failure of any other span. D i is the set of O-D demand pairs affected by failure of span i and R r is the set of backup routes for demand pair r hich cross span. A number of other aspects ere common to all design types and their solutions. All orking and spare capacity allocations ere integer, corresponding for example to capacity design and restoration mechanisms handling single avelengths. Any of the models can be converted to a modular design formulation as shon in [0]. For comparative studies e avoid any specific modularity assumptions hich could obscure the general underlying comparison of methods that is intended. Results are based on a full CPLEX termination or a MIPGAP under 0-4 (i.e., ithin 0.0% of optimal) ith the exception of the path restorable designs (ithin 0.% of optimal) and SBPP designs (strictly 5%, most are ithin %). All designs ere also based on an arc-path approach to capacitating the solution. This requires preprocessing steps (discussed next) to enumerate sets of eligible routes for restoration and, in the oint formulations, also for orking flo assignment. D. Route Enumeration for the Arc-Path Formulations To create the eligible route sets to populate the formulations, e used a strategy that results in a minimum target number of distinct route options for the restoration of any failure and eligible route options for routing of each orking path. A program varies the hop limit adaptively for each span failure or demand pair, finding all distinct eligible routes

6 ithin that hop limit, until at least the target number of eligible routes are found. The results are all based on representing at least 0 distinct routes for every span failure or affected demand pair, except for the SBPP designs, hich used at least 5 distinct backup routes. The JCA designs used at least 0 distinct route choices for the routing of each orking demand. In the meta-mesh designs, hen the logical chain bypass spans are added, the eligible route-sets for orking paths are updated ith an additional set of at least 0 orking routes per O-D pair to reflect ne routing options that may use the bypass spans. Similarly, for restoration of the ne bypass spans themselves, a minimum of 0 ne restoration routes are generated for each chain bypass span failure, excluding routes that ould include the associated chain itself. IV. RESULTS AND DISCUSSION A. Redundancy and Capacity Results Figures and 3 are the main presentation of the comparative design results. Figure presents results in terms of redundancy primarily so that the /( d -) bound can be overlaid for comparison. Figure 3 presents the orking and spare capacity requirements of each design. In both figures, redundancy and capacity are based on distance-eighted measures ( cost ), not ust channel counts. Figures and 3 have many interesting aspects. The first most noticeable effect in Figure is that + path protection ithout sharing is extraordinarily redundant; it is never less than 40% redundant and surpasses 00%, consistent ith the fact that + is really a form of ring-based protection. The gap in the + APS curve is due to routing infeasibilities discussed belo. 0% 00% + APS 80% Distance-Capacity Redundancy 60% 40% 0% 00% 80% SCA M-M JCA SBPP 60% Path ( d -) 40% Netork Average Nodal Degree, d Figure : Redundancy of various mesh protection and restoration schemes as a function of netork average nodal degree. In both Figures and 3, the basic ranking of SCA, JCA, and path restoration is consistent ith prior results for single-netork solutions to these problems [9]. JCA improves considerably over SCA by slight changes to the routing of orking paths that have the effect of a relative levelling out of nodal orking capacity quantities, improving the overall capacity efficiency. Also notable in Figure is ho ell SCA and JCA parallel the shape of the /( d -) loer bound. The bound is obviously loer on the scale than either the SCA or JCA curves but the similarity in shape suggests that the arguments underlying the bound also underlie the nature of these types of restorable netork in terms of ho they gain efficiency ith higher degree. In contrast the path-restoration curve is not only loer than the /( d -) bound (hich is only a bound for span restoration) but it also seems to have a different functional form hen plotted against d. It drops at a steeper rate as connectivity increases initially and is then almost flat, although still decreasing 6

7 slightly, as the netork becomes more richly connected. It is plausible that starting from a very sparse netork, path restoration can exploit increases in connectivity more rapidly than span restoration by virtue of its more sophisticated end-to-end vie of restoration re-routing problem. Note in passing the actual redundancy levels of the path restoration designs. Anyhere above d =.6 or so, they are in the 45% to 50% range. This is three to four times more efficient than + APS and almost tice as efficient as SCA. This also substantiates the idespread general appreciation that path-restoration is the most efficient possible scheme, but hopefully also clarifies that this is not at all achieved by nonshared + path protection, even though both are path schemes. Note also the slightly rising slope on segments of the redundancy curves. This is only a reflection of the fact that, as Figure 3 shos, orking capacity keeps decreasing sloly as degree rises. Since redundancy is the ratio of spare to orking, the result is that redundancy (as strictly defined) increases. The total capacity cost is nonetheless dropping. The remaining curves to discuss are SBPP and meta-mesh. The SBPP curve is punctuated by cases here the SBPP design had one or more routing infeasibilities on the given graph. The + APS designs are similarly affected for the same reason. The general issue is that illustrated beteen nodes A and B in Figure 4. As defined SBPP first takes the shortest route for the orking path as indicated, and it is then impossible to find a disoint second route. The problem can of course be overcome by instead finding the shortest cycle containing the to O-D nodes or to iteratively alter the first route choice upon discovery of the infeasibility until a disoint route exists. For present ork, hoever, e have modelled the simpler provisioning model, as e understand it is being considered in many quarters that SBPP can ork this ay. If so, e only ish to point out the issue of such routing infeasibilities and note that they can be particularly frequent in sparse physical layer transport graphs. For example in Figure 4, connections from node B to the to nodes to the right of A are similarly infeasible under the existing SBPP path provisioning logic. Setting aside the infeasibilities for SBPP (and +) e note that SBPP is generally intermediate in efficiency beteen the meta-mesh designs and true path restoration. In practice the provisioning infeasibility problem can be solved but ill add slightly to the capacity requirements of the SBPP curve. Aside from this, its relative simplicity and efficiency are attractive. Finally, the meta-mesh designs provide an interesting ne option, especially for netorks ith d around.4 to.8. In this region the meta-mesh designs are essentially as efficient as SBPP and are in fact beating the /( d -) bound, even though they require only a span restoration mechanism. This apparent contradiction is explained further in [] Work and Spare Total Capacity Costs Path Spare SBPP Spare M-M Spare JCA Spare M-M Work JCA Work S.P. Work SCA Spare Netork Average Nodal Degree, d Figure 3: Breakdon of orking and spare capacity versus netork average nodal degree. 7

8 Figure 3 shos the totals of orking and spare capacity in the designs, omitting + APS to permit closer scrutiny of the other schemes. The plot shos clearly that amongst competing mesh-restorable design types, the differences to be had are essentially all in the spare capacity. Note that the S.P. Work curve gives the shortest-path routed orking capacity used by the SCA, SBPP, and path restoration designs. In other ords all schemes use almost the same amount of orking capacity. Even here JCA and A meta-mesh employ oint optimization, the orking paths deviate very slightly in length from shortest paths. A related message that Figure 3 gives to someone ho is considering the capacity difference beteen ring and mesh schemes is that the relative benefit in orking path routing is obtained by going to any kind of mesh scheme. Only after that does the exact type of mesh scheme matter to further savings obtainable through spare capacity efficiency. The ra results behind Figures and 3 exhibit some effects that e attribute to limited routeenumeration and effects related to shortest-path B routing. It should not for instance strictly be possible Figure 4: Illustrating routing infeasibility in SBPP. for capacity to rise anyhere on the curves of Figure 3 hen going from one graph topology to a more connected one (i.e. left to right) in the progression that Figure 3 is based upon. This is because ithin the more connected graph, the routing and capacitation on a prior less connected graph alays represents a feasible default solution that could be adopted if the design cost appeared to rise in the more connected test graph. This can, hoever, happen in cases here the demands are strictly shortest-path routed in each test solution. Any changes to orking path routing, even ones that shorten the orking routes, can in principle cause increases in spare capacity requirements, especially if there is also a practical limit on the number of eligible restoration routes represented in the formulations. Having noted this computational effect in our ra data, it is not large enough to affect the relative comparison of schemes significantly. Figure 3 does, hoever, contain a fe data points adusted to minimize these anomalous effects. Several points on the SCA and M-M curves are numerically adusted ithin a fe percent to account for this. The adustments are to represent that one ould not in practice accept a higher capacity cost after finding a loer cost design on a sparser graph B. Bounds and Estimator Results Figure 5 reproduces the SCA and JCA redundancy curves overlaid by curves of the estimators developed above, hich are parametric in / as a characterization of the orking capacity disparity values. 0% Distance-Capacity Redundancy 0% 00% 90% 80% 70% 60% JCA SCA k ( Est #: k = Est #: k = 0 Est #: k = 5 Est #: k =.5 Est #: k = 5 Est #: k = 50% Est #: k =.5 ( d -) bound 40% Netork Average Nodal Degree, d Figure 5: Comparing SCA and JCA results to the estimators for span-restorable netorks. 8

9 V. CONCLUDING COMMENTS The main contribution of this ork is the systematic comparison of six mesh survivability schemes against each other and in a setting that shos ho they each respond to netork graph connectivity. All schemes ere found to have almost identical orking capacity requirements, the important differences being in spare capacity requirements. Routing infeasibilities are noted in the provisioning of the shared backup path protection scheme at lo netork degree. An interesting finding is that the chain optimized meta-mesh concept can beat the /( d -) bound on span-restorable redundancy but still employs a span restoration mechanism. As expected, path restoration outperforms all other mechanisms but is also the most complicated. Meta-mesh and SBPP are almost as efficient as true path restoration but simpler to implement (and in the meta-mesh case, easier to implement). In the ork on bounds and estimators, e find that the /( d -) bound for span restoration seems to truly explain the ay in hich span-restorable schemes react to graph connectivity. The to estimators give added insights about ho balancing orking capacity influences achievable redundancy but they do not closely track the design results for either SCA or JCA against d. Their value may be more as a stepping stone to further ork on bounds or approximators based on a coupled node-pair vie. VI. REFERENCES [] W. D. Grover, J. Doucette, Topological design of mesh-restorable transport netorks, accepted for Annals of Operations Research, Special Issue on Topological Design of Telecommunication Netorks, June 00, (5 ms). [] W. D. Grover, J. Doucette, Increasing the Efficiency of Span-Restorable Mesh Netorks on Lo-Connectivity Graphs, Proc. of 3 rd Int. Workshop on the Design of Reliable Communication Netorks (DRCN 00), Budapest, Hungary, October 00. [3] W. D. Grover, Distributed Restoration of the Transport Netork, Chapter in Netork Management into the st Century, editors T. Plevyak, S. Aidarous, IEEE / IEE Press co-publication, February 994, pp [4] D. A. Dunn, W. D. Grover, M. H. MacGregor, A comparison of k-shortest paths and maximum flo methods for netork facility restoration, IEEE Journal on Selected Areas in Communications, vol., no., January 994, pp [5] R. Kaamura, K. Sato, I. Tokizaa, Self-healing ATM netorks based on virtual path concept IEEE Journal on Selected Areas in Communications, vol., no., January 994, pp [6] W. D. Grover, Y. Zheng, VP-Based Netork Design ith Controlled Over-Subscription of Restoration Capacity, Proc. of st Int. Workshop on the Design of Reliable Communication Netorks (DRCN 998), Brugge, Belgium, May 998, O33. [7] S. Kini, M. Kodialam, T. V. Laksham, C. Villamizar, Shared backup Label Sitched Path restoration, Work in Progress, IETF Internet Draft, draft-kini-restoration-shared-backup-00.txt, November 000. [8] R.R. Iraschko, W. D. Grover, A Highly Efficient Path-Restoration Protocol for Management of Optical Netork Transport Integrity, IEEE Journal on Selected Areas in Communications, vol.8, no.5, May 000, pp [9] R.Iraschko, M. MacGregor, W. D. Grover, Optimal Capacity Placement for path restoration in STM or ATM Mesh Survivable Netorks, IEEE/ACM Transactions on Netorking, vol. 6, no. 3, June 998, pp [0] J. Doucette, W. D. Grover, Influence of Modularity and Economy-of-scale Effects on Design of Mesh-Restorable DWDM Netorks, IEEE Journal on Selected Areas in Communications, vol. 8, no. 0, October 000, pp [] Y. Xiong, L. G. Mason, Restoration Strategies and Spare Capacity Requirements in Self-Healing ATM Netorks, IEEE/ACM Transactions on Netorking, vol. 7, no., February 999, pp

Lecture 15. Turbo codes make use of a systematic recursive convolutional code and a random permutation, and are encoded by a very simple algorithm:

Lecture 15. Turbo codes make use of a systematic recursive convolutional code and a random permutation, and are encoded by a very simple algorithm: 18.413: Error-Correcting Codes Lab April 6, 2004 Lecturer: Daniel A. Spielman Lecture 15 15.1 Related Reading Fan, pp. 108 110. 15.2 Remarks on Convolutional Codes Most of this lecture ill be devoted to

More information

Reality Chess. Yellow. White

Reality Chess. Yellow. White Reality Chess Reality Chess is a game for four players (ith variations for to and three players hich ill be covered in separate sections). Although most of the primary rule set for standard chess is employed,

More information

Wavelength Assignment Problem in Optical WDM Networks

Wavelength Assignment Problem in Optical WDM Networks Wavelength Assignment Problem in Optical WDM Networks A. Sangeetha,K.Anusudha 2,Shobhit Mathur 3 and Manoj Kumar Chaluvadi 4 asangeetha@vit.ac.in 2 Kanusudha@vit.ac.in 2 3 shobhitmathur24@gmail.com 3 4

More information

Copyright 2010 Rock Star Recipes Ltd.

Copyright 2010 Rock Star Recipes Ltd. Copyright 2010 Rock Star Recipes Ltd. ll rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying,

More information

A Comparative Study of Restoration Schemes and Spare Capacity Assignments in Mesh Networks

A Comparative Study of Restoration Schemes and Spare Capacity Assignments in Mesh Networks A Comparative Study of Restoration Schemes and Spare Capacity Assignments in Mesh Networks Maulin Patel*, R. Chandrasekaran and S. Venkatesan Erik Jonsson School of Engineering and Computer Science University

More information

The Path Restoration Version of the Spare Capacity Allocation Problem with Modularity Restrictions: Models, Algorithms, and an Empirical Analysis

The Path Restoration Version of the Spare Capacity Allocation Problem with Modularity Restrictions: Models, Algorithms, and an Empirical Analysis The Path Restoration Version of the Spare Capacity Allocation Problem with Modularity Restrictions: Models, Algorithms, and an Empirical Analysis Jeffery L. Kennington Mark W. Lewis Department of Computer

More information

Removing Ionospheric Corruption from Low Frequency Radio Arrays

Removing Ionospheric Corruption from Low Frequency Radio Arrays Removing Ionospheric Corruption from Lo Frequency Radio Arrays Sean Ting 12/15/05 Thanks to Shep Doeleman, Colin Lonsdale, and Roger Cappallo of Haystack Observatory for their help in guiding this proect

More information

STRATEGIES FOR SELECTING ADDITIONAL TRAFFIC COUNTS FOR IMPROVING O-D TRIP TABLE ESTIMATION

STRATEGIES FOR SELECTING ADDITIONAL TRAFFIC COUNTS FOR IMPROVING O-D TRIP TABLE ESTIMATION Transportmetrica, Vol. 3, No. 3 (2007), 9-2 STRATEGIES FOR SELECTING ADDITIONAL TRAFFIC COUNTS FOR IMPROVING O-D TRIP TABLE ESTIMATION ANTHONY CHEN, SURACHET PRAVINVONGVUTH 2, PIYA CHOOTINAN 3, MING LEE

More information

SIGNATURE ANALYSIS FOR MEMS PSEUDORANDOM TESTING USING NEURAL NETWORKS

SIGNATURE ANALYSIS FOR MEMS PSEUDORANDOM TESTING USING NEURAL NETWORKS 2th IMEKO TC & TC7 Joint Symposium on Man Science & Measurement September, 3 5, 2008, Annecy, France SIGATURE AALYSIS FOR MEMS PSEUDORADOM TESTIG USIG EURAL ETWORKS Lukáš Kupka, Emmanuel Simeu², Haralampos-G.

More information

Infographics for Educational Purposes: Their Structure, Properties and Reader Approaches

Infographics for Educational Purposes: Their Structure, Properties and Reader Approaches Infographics for Educational Purposes: Their Structure, Properties and Reader Approaches Assist. Prof. Dr. Serkan Yıldırım Ataturk University, Department of Computer Education and Instructional Technology

More information

Reducing ATE Cost in System-on-Chip Test

Reducing ATE Cost in System-on-Chip Test Reducing ATE Cost in System-on-Chip Test Ilia Polian Bernd Becker Institute of Computer Science Albert-Ludigs-University Georges-Köhler-Allee 51 79110 Freiburg im Breisgau, Germany email: < polian, becker

More information

Color Correction in Color Imaging

Color Correction in Color Imaging IS&'s 23 PICS Conference in Color Imaging Shuxue Quan Sony Electronics Inc., San Jose, California Noboru Ohta Munsell Color Science Laboratory, Rochester Institute of echnology Rochester, Ne York Abstract

More information

A Three-Microphone Adaptive Noise Canceller for Minimizing Reverberation and Signal Distortion

A Three-Microphone Adaptive Noise Canceller for Minimizing Reverberation and Signal Distortion American Journal of Applied Sciences 5 (4): 30-37, 008 ISSN 1546-939 008 Science Publications A Three-Microphone Adaptive Noise Canceller for Minimizing Reverberation and Signal Distortion Zayed M. Ramadan

More information

Span Restoration for Flexi-Grid Optical Networks under Different Spectrum Conversion Capabilities

Span Restoration for Flexi-Grid Optical Networks under Different Spectrum Conversion Capabilities Span Restoration for Flexi-Grid Optical Networks under Different Spectrum Conversion Capabilities Yue Wei, Gangxiang Shen School of Electronic and Information Engineering Soochow University Suzhou, Jiangsu

More information

Reliable and Total Order Broadcast in the Crash-Recovery Model

Reliable and Total Order Broadcast in the Crash-Recovery Model Reliable and Total Order Broadcast in the Crash-Recovery Model Romain Boichat Rachid Guerraoui Communication Systems Department Siss Federal Institute of Technology CH - 1015 Lausanne Abstract This paper

More information

EFFECTS OF CHARGE INJECTION ERROR ON SWITCHED CURRENT DIVIDER CIRCUITS.

EFFECTS OF CHARGE INJECTION ERROR ON SWITCHED CURRENT DIVIDER CIRCUITS. EFFECTS OF CHARGE INJECTION ERROR ON SWITCHED CURRENT DIVIDER CIRCUITS. E.GARNIER, PH. ROUX and Ph.MARCHEGAY. aboratoire IX C.N.R.S. UMR 5818 E.N.S.E.I.R.B Université Bordeaux I 351, cours de la libération

More information

An Adaptive Data-transfer Protocol for Sensor Networks with Data Mules

An Adaptive Data-transfer Protocol for Sensor Networks with Data Mules An Adaptive Data-transfer Protocol for Sensor Netorks ith Data Mules Giuseppe Anastasi *, Marco Conti #, Emmanuele Monaldi *, Andrea Passarella # * Dept. of Information Engineering University of Pisa,

More information

Delay Pattern Estimation for Signalized Intersections Using Sampled Travel Times

Delay Pattern Estimation for Signalized Intersections Using Sampled Travel Times Delay Pattern Estimation for Signalized Intersections Using Sampled Travel Times Xuegang (Jeff) Ban, Ryan Herring, Peng Hao, and Alexandre M. Bayen Intersection delays are the major contributing factor

More information

Laboratory 1: Uncertainty Analysis

Laboratory 1: Uncertainty Analysis University of Alabama Department of Physics and Astronomy PH101 / LeClair May 26, 2014 Laboratory 1: Uncertainty Analysis Hypothesis: A statistical analysis including both mean and standard deviation can

More information

WAN_0247. DRC Attack and Decay Times for Real Audio Signals INTRODUCTION SCOPE

WAN_0247. DRC Attack and Decay Times for Real Audio Signals INTRODUCTION SCOPE DRC Attack and Decay Times for Real Audio Signals INTRODUCTION SCOPE Dynamic range controllers (DRCs) are systems used to dynamically adjust the signal gain in conditions here the input amplitude is unknon

More information

Content Downloading in Vehicular Networks: What Really Matters

Content Downloading in Vehicular Networks: What Really Matters Content Donloading in Vehicular Netorks: What Really Matters Francesco Malandrino malandrino@tlc.polito.it Claudio Casetti casetti@polito.it Carla-Fabiana Chiasserini chiasserini@polito.it Marco Fiore

More information

Gateways Placement in Backbone Wireless Mesh Networks

Gateways Placement in Backbone Wireless Mesh Networks I. J. Communications, Network and System Sciences, 2009, 1, 1-89 Published Online February 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Gateways Placement in Backbone Wireless Mesh Networks Abstract

More information

Off-line Survivable Impairment-aware Routing and Wavelength Assignment

Off-line Survivable Impairment-aware Routing and Wavelength Assignment Off-line Survivable Impairment-aare Routing and Wavelength Assignment Anteneh Beshir, Roeland Nuijts, Richa Malhotra, and Fernando Kuipers Introduction Physical impairments caused by noise and signal distortions

More information

The Effects of MIMO Antenna System Parameters and Carrier Frequency on Active Control Suppression of EM Fields

The Effects of MIMO Antenna System Parameters and Carrier Frequency on Active Control Suppression of EM Fields RADIOENGINEERING, VOL. 16, NO. 1, APRIL 2007 31 The Effects of MIMO Antenna System Parameters and Carrier Frequency on Active Control Suppression of EM Fields Abbas MOAMMED and Tommy ULT Dept. of Signal

More information

A Compact Narrow-Band Bandstop Filter Using Spiral-Shaped Defected Microstrip Structure

A Compact Narrow-Band Bandstop Filter Using Spiral-Shaped Defected Microstrip Structure RADIOENGINEERING, VOL. 23, NO. 1, APRIL 21 29 A Compact Narro-Band Bandstop Filter Using Spiral-Shaped Defected Microstrip Structure Jun WANG 1, Huansheng NING 1,2, Qingxu XIONG 1, Lingfeng MAO 3 1 School

More information

RECOMMENDATION ITU-R P Attenuation by atmospheric gases

RECOMMENDATION ITU-R P Attenuation by atmospheric gases Rec. ITU-R P.676-6 1 RECOMMENDATION ITU-R P.676-6 Attenuation by atmospheric gases (Question ITU-R 01/3) (1990-199-1995-1997-1999-001-005) The ITU Radiocommunication Assembly, considering a) the necessity

More information

The Ultimate Guide To Bass Harmonics. Create chords, melodies and solo bass pieces using harmonics

The Ultimate Guide To Bass Harmonics. Create chords, melodies and solo bass pieces using harmonics The Ultimate Guide To Bass Harmonics Create chords, melodies and solo bass pieces using harmonics Ho To Use This Guide Welcome to this Ultimate Guide! It s great to have you on board. First things first,

More information

A Large-Scale MIMO Precoding Algorithm Based on Iterative Interference Alignment

A Large-Scale MIMO Precoding Algorithm Based on Iterative Interference Alignment BUGARAN ACADEMY OF SCENCES CYBERNETCS AND NFORMATON TECNOOGES Volume 14, No 3 Sofia 014 Print SSN: 1311-970; Online SSN: 1314-4081 DO: 10478/cait-014-0033 A arge-scale MMO Precoding Algorithm Based on

More information

DRC Operation in Wolfson Audio CODECs WM8903 WM8904 WM8912 WM8944 WM8945 WM8946. Table 1 Devices that use the DRC Function

DRC Operation in Wolfson Audio CODECs WM8903 WM8904 WM8912 WM8944 WM8945 WM8946. Table 1 Devices that use the DRC Function DRC Operation in Wolfson Audio CODECs WAN-0215 INTRODUCTION This applications note has been created to explain the operation of the Dynamic Range Controller (DRC) used in the latest Wolfson audio CODECs.

More information

Preliminary Design for the Digital Processing Subsystem of a Long Wavelength Array Station I. Introduction and Summary II.

Preliminary Design for the Digital Processing Subsystem of a Long Wavelength Array Station I. Introduction and Summary II. LWA Memo No. 154 Preliminary Design for the Digital Processing of a Long Wavelength Array Station L. D'Addario and R. Navarro Jet Propulsion Laboratory, California Institute of Technology 1 11 February

More information

How Much Can Sub-band Virtual Concatenation (VCAT) Help Static Routing and Spectrum Assignment in Elastic Optical Networks?

How Much Can Sub-band Virtual Concatenation (VCAT) Help Static Routing and Spectrum Assignment in Elastic Optical Networks? How Much Can Sub-band Virtual Concatenation (VCAT) Help Static Routing and Spectrum Assignment in Elastic Optical Networks? (Invited) Xin Yuan, Gangxiang Shen School of Electronic and Information Engineering

More information

The Chromatic Scale (all half steps) The Major Scale The formula for the major scale is: w w 1/2 w w w 1/2. Minor Scales

The Chromatic Scale (all half steps) The Major Scale The formula for the major scale is: w w 1/2 w w w 1/2. Minor Scales The hromatic Scale (all half steps) # # E F F# # A A# B OR: b Eb E F b Ab A Bb B # # E F F# # A A # B & # # # # # b E b E F b A b A B b B & b n b n b n b n b n The Major Scale The formula for the major

More information

RECURSIVE BLIND IDENTIFICATION AND EQUALIZATION OF FIR CHANNELS FOR CHAOTIC COMMUNICATION SYSTEMS

RECURSIVE BLIND IDENTIFICATION AND EQUALIZATION OF FIR CHANNELS FOR CHAOTIC COMMUNICATION SYSTEMS 6th European Signal Processing Conference (EUSIPCO 008), Lausanne, Sitzerland, August 5-9, 008, copyright by EURASIP RECURSIVE BLIND IDENIFICAION AND EQUALIZAION OF FIR CHANNELS FOR CHAOIC COMMUNICAION

More information

Travel time uncertainty and network models

Travel time uncertainty and network models Travel time uncertainty and network models CE 392C TRAVEL TIME UNCERTAINTY One major assumption throughout the semester is that travel times can be predicted exactly and are the same every day. C = 25.87321

More information

THE MEASUREMENT OF MODULATION NOISE ON MAGNETIC TAPES

THE MEASUREMENT OF MODULATION NOISE ON MAGNETIC TAPES RSARCH DPARTMNT TH MASURMNT OF MODULATION NOIS ON MAGNTIC TAPS Report No. C-090 ( 1956/7 ) P.. Axon, O.B.., M.Se., Ph.D., A.M.I... R.F. Russ - - (W. Proctor Wilson) This Report is the property of the British

More information

Series 430 Pneumatic Controller Modules Type 3433 Additional Modules Type 3437

Series 430 Pneumatic Controller Modules Type 3433 Additional Modules Type 3437 eries 430 Pneumatic s Type 3433 Additional s Type 3437 Application ler modules for installation in Type 3430 Pneumatic lers Additional modules for supplementing controller modules used in special industrial

More information

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks Eiman Alotaibi, Sumit Roy Dept. of Electrical Engineering U. Washington Box 352500 Seattle, WA 98195 eman76,roy@ee.washington.edu

More information

16 MICROSTRIP LINE FILTERS

16 MICROSTRIP LINE FILTERS 16 Microstrip Line Filters 16 MICRSTRIP LINE FILTERS Receiver De- Mod 99 Washington Street Melrose, MA 176 Phone 781-665-14 Toll Free 1-8-517-8431 Visit us at.testequipmentdepot.com Antenna Lo-Pass Filter

More information

Computing Call-Blocking Probabilities in LEO Satellite Networks: The Single-Orbit Case

Computing Call-Blocking Probabilities in LEO Satellite Networks: The Single-Orbit Case 332 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 51, NO. 2, MARCH 2002 Computing Call-Blocking Probabilities in LEO Satellite Networks: The Single-Orbit Case Abdul Halim Zaim, George N. Rouskas, Senior

More information

Analysis of Circuit for Dynamic Wireless Power Transfer by Stepping Stone System

Analysis of Circuit for Dynamic Wireless Power Transfer by Stepping Stone System Analysis of Circuit for Dynamic Wireless Poer Transfer by Stepping Stone System 6mm Hiroshi Uno ) Jun Yamada ) Yasuyoshi Kaneko ) Toshiyuki Fujita ) Hiroyuki Kishi ) ) Saitama University, Graduate school

More information

Applying p-cycle Technique to Elastic Optical Networks

Applying p-cycle Technique to Elastic Optical Networks Applying p-cycle Technique to Elastic Optical Networks Yue Wei, Kai Xu, Heming Zhao, Member, IEEE, Gangxiang Shen, Senior Member, IEEE Abstract This paper considers the p-cycle network protection technique

More information

A Systematic Wavelength Assign Algorithm for Multicast in WDM Networks with Sparse Conversion Nodes *

A Systematic Wavelength Assign Algorithm for Multicast in WDM Networks with Sparse Conversion Nodes * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 5, 559-574 (009) A Systematic avelength Assign Algorithm for Multicast in DM Networks with Sparse Conversion Nodes * I-HSUAN PENG, YEN-EN CHEN AND HSIANG-RU

More information

How (Information Theoretically) Optimal Are Distributed Decisions?

How (Information Theoretically) Optimal Are Distributed Decisions? How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr

More information

SURVIVABILITY in the face of failures has become an essential

SURVIVABILITY in the face of failures has become an essential IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL., NO., JUNE 00 Spare Capacity Allocation in Two-Layer Networks Yu Liu, Member, IEEE, David Tipper, Senior Member, IEEE, Korn Vajanapoom Abstract In

More information

Distributed Power Control in Cellular and Wireless Networks - A Comparative Study

Distributed Power Control in Cellular and Wireless Networks - A Comparative Study Distributed Power Control in Cellular and Wireless Networks - A Comparative Study Vijay Raman, ECE, UIUC 1 Why power control? Interference in communication systems restrains system capacity In cellular

More information

Series 430 Pneumatic Controller Modules Type 3433 Additional Modules Type 3437

Series 430 Pneumatic Controller Modules Type 3433 Additional Modules Type 3437 eries 430 Pneumatic ler s Type 3433 Additional s Type 3437 Application ler modules for the Type 3431 and 3432 tations Additional modules for supplementing controller modules used in special industrial

More information

Link Activation with Parallel Interference Cancellation in Multi-hop VANET

Link Activation with Parallel Interference Cancellation in Multi-hop VANET Link Activation with Parallel Interference Cancellation in Multi-hop VANET Meysam Azizian, Soumaya Cherkaoui and Abdelhakim Senhaji Hafid Department of Electrical and Computer Engineering, Université de

More information

Research Article A Mathematical Analysis of the Card Game of Betweenies through Kelly s Criterion

Research Article A Mathematical Analysis of the Card Game of Betweenies through Kelly s Criterion Journal of Probability and Statistics Volume 2010, Article ID 313148, 19 pages doi:10.1155/2010/313148 Research Article A Mathematical Analysis of the Card Game of Beteenies through Kelly s Criterion Konstantinos

More information

The traits of engineers and their relationship with analysis. What comes first: analysis or experience?

The traits of engineers and their relationship with analysis. What comes first: analysis or experience? CHAPTER 16 (QJLQHHULQJ$QDO\VLV,1752'8&7,21 Analysis is the breaking don of an object into its basic elements to get to its essence. This process is a means of studying the nature of something and identifying

More information

Qian Wang and Sotirios G. Ziavras. New Jersey Institute of Technology. Professor Sotirios G. Ziavras

Qian Wang and Sotirios G. Ziavras. New Jersey Institute of Technology. Professor Sotirios G. Ziavras Poerful and Feasible Processor Interconnections With an Evaluation of Their Communications Capabilities Qian Wang and Sotirios G. Ziavras Departments of Electrical and Computer Engineering, and Computer

More information

Sizing of active power filters using some optimization strategies

Sizing of active power filters using some optimization strategies Sizing of active poer filters using some optimization strategies Dariusz Grabosi, Marcin Maciąże, Marian Paso Silesian University of Technology, Faculty of Electrical Engineering 44-100 Gliice, ul. Aademica

More information

A Chance-Constrained Model Cutting Planes for Fixed Broadband Wireless Networks

A Chance-Constrained Model Cutting Planes for Fixed Broadband Wireless Networks A Chance-Constrained Model Cutting Planes for Fixed Broadband Wireless Netorks Grit Classen, David Coudert, Arie Koster, Napoleao Nepomuceno To cite this version: Grit Classen, David Coudert, Arie Koster,

More information

A REVIEW ON PLACEMENT OF WAVELENGTH CONVERTERS IN WDM P-CYCLE NETWORK

A REVIEW ON PLACEMENT OF WAVELENGTH CONVERTERS IN WDM P-CYCLE NETWORK A REVIEW ON PLACEMENT OF WAVELENGTH CONVERTERS IN WDM P-CYCLE NETWORK Rupali Agarwal 1 and Rachna Asthana 2 1 Department of Electronics and Communication Engineering, BBDGEI, Lucknow roopali.ipec@gmail.com

More information

Mehrdad Amirghasemi a* Reza Zamani a

Mehrdad Amirghasemi a* Reza Zamani a The roles of evolutionary computation, fitness landscape, constructive methods and local searches in the development of adaptive systems for infrastructure planning Mehrdad Amirghasemi a* Reza Zamani a

More information

DOA-ALOHA: Slotted ALOHA for Ad Hoc Networking Using Smart Antennas

DOA-ALOHA: Slotted ALOHA for Ad Hoc Networking Using Smart Antennas DOA-ALOHA: Slotted ALOHA for Ad Hoc Netorking Using Smart Antennas Harkirat Singh and Suresh Singh, Department of Computer Science Portland State University, Portland, OR 972 harkirat,singh @cs.pdx.edu

More information

REDUCING THE PEAK TO AVERAGE RATIO OF MULTICARRIER GSM AND EDGE SIGNALS

REDUCING THE PEAK TO AVERAGE RATIO OF MULTICARRIER GSM AND EDGE SIGNALS REDUCING THE PEAK TO AVERAGE RATIO OF MULTICARRIER GSM AND EDGE SIGNALS Olli Väänänen, Jouko Vankka and Kari Halonen Electronic Circuit Design Laboratory, Helsinki University of Technology, Otakaari 5A,

More information

Blind Beamforming for Cyclostationary Signals

Blind Beamforming for Cyclostationary Signals Course Page 1 of 12 Submission date: 13 th December, Blind Beamforming for Cyclostationary Signals Preeti Nagvanshi Aditya Jagannatham UCSD ECE Department 9500 Gilman Drive, La Jolla, CA 92093 Course Project

More information

IMAGE PROCESSING TECHNIQUES FOR CROWD DENSITY ESTIMATION USING A REFERENCE IMAGE

IMAGE PROCESSING TECHNIQUES FOR CROWD DENSITY ESTIMATION USING A REFERENCE IMAGE Second Asian Conference on Computer Vision (ACCV9), Singapore, -8 December, Vol. III, pp. 6-1 (invited) IMAGE PROCESSING TECHNIQUES FOR CROWD DENSITY ESTIMATION USING A REFERENCE IMAGE Jia Hong Yin, Sergio

More information

Simulative Comparison of MPLS Protection Switching vs. OSPF Re-routing

Simulative Comparison of MPLS Protection Switching vs. OSPF Re-routing C O R P O R A T E T E C H N O L O Y Simulative Comparison of MPLS Protection Switching vs. OSPF Re-routing nformation & Sandrine PASQUALINI Antoine FROT Andreas Iselt Andreas Kirstädter C O R P O R A T

More information

Game Mechanics Minesweeper is a game in which the player must correctly deduce the positions of

Game Mechanics Minesweeper is a game in which the player must correctly deduce the positions of Table of Contents Game Mechanics...2 Game Play...3 Game Strategy...4 Truth...4 Contrapositive... 5 Exhaustion...6 Burnout...8 Game Difficulty... 10 Experiment One... 12 Experiment Two...14 Experiment Three...16

More information

X.-T. Fang, X.-C. Zhang, and C.-M. Tong Missile Institute of Air Force Engineering University Sanyuan, Shanxi , China

X.-T. Fang, X.-C. Zhang, and C.-M. Tong Missile Institute of Air Force Engineering University Sanyuan, Shanxi , China Progress In Electromagnetics Research Letters, Vol. 23, 129 135, 211 A NOVEL MINIATURIZED MICRO-STRIP SIX-PORT JUNCTION X.-T. Fang, X.-C. Zhang, and C.-M. Tong Missile Institute of Air Force Engineering

More information

Balancing Bandwidth and Bytes: Managing storage and transmission across a datacast network

Balancing Bandwidth and Bytes: Managing storage and transmission across a datacast network Balancing Bandwidth and Bytes: Managing storage and transmission across a datacast network Pete Ludé iblast, Inc. Dan Radke HD+ Associates 1. Introduction The conversion of the nation s broadcast television

More information

Mission Reliability Estimation for Repairable Robot Teams

Mission Reliability Estimation for Repairable Robot Teams Carnegie Mellon University Research Showcase @ CMU Robotics Institute School of Computer Science 2005 Mission Reliability Estimation for Repairable Robot Teams Stephen B. Stancliff Carnegie Mellon University

More information

Basic Stuff That You HAVE To Know

Basic Stuff That You HAVE To Know The first thing and possily the most important thing is the cycle of 5ths (or 4ths depending if you go up or don). 5ths (4ths) refers to intervals. Here is the cycle starting on C. 4 4 Basic Stuff That

More information

STRATEGY AND COMPLEXITY OF THE GAME OF SQUARES

STRATEGY AND COMPLEXITY OF THE GAME OF SQUARES STRATEGY AND COMPLEXITY OF THE GAME OF SQUARES FLORIAN BREUER and JOHN MICHAEL ROBSON Abstract We introduce a game called Squares where the single player is presented with a pattern of black and white

More information

Games. Episode 6 Part III: Dynamics. Baochun Li Professor Department of Electrical and Computer Engineering University of Toronto

Games. Episode 6 Part III: Dynamics. Baochun Li Professor Department of Electrical and Computer Engineering University of Toronto Games Episode 6 Part III: Dynamics Baochun Li Professor Department of Electrical and Computer Engineering University of Toronto Dynamics Motivation for a new chapter 2 Dynamics Motivation for a new chapter

More information

Evaluating Electromagnetic Railway Environment Using adaptive Time-Frequency Analysis

Evaluating Electromagnetic Railway Environment Using adaptive Time-Frequency Analysis Evaluating Electromagnetic Railay Environment Using adaptive Time-Frequency Analysis Mohamed Raouf Kousr Virginie Deniau, Marc Heddebaut, Sylvie Baranoski Abstract With the current introduction of ne technologies

More information

Achieving Desirable Gameplay Objectives by Niched Evolution of Game Parameters

Achieving Desirable Gameplay Objectives by Niched Evolution of Game Parameters Achieving Desirable Gameplay Objectives by Niched Evolution of Game Parameters Scott Watson, Andrew Vardy, Wolfgang Banzhaf Department of Computer Science Memorial University of Newfoundland St John s.

More information

Cracking the Sudoku: A Deterministic Approach

Cracking the Sudoku: A Deterministic Approach Cracking the Sudoku: A Deterministic Approach David Martin Erica Cross Matt Alexander Youngstown State University Youngstown, OH Advisor: George T. Yates Summary Cracking the Sodoku 381 We formulate a

More information

OSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP

OSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP Agenda OSPF Principles Introduction The Dijkstra Algorithm Communication Procedures LSA Broadcast Handling Splitted Area

More information

OSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database

OSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database OSPF - Open Shortest Path First OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP distance vector protocols like RIP have several dramatic disadvantages: slow adaptation

More information

Introduction to Jazz Guitar Chords and Comping Styles. -by Mike Scott

Introduction to Jazz Guitar Chords and Comping Styles. -by Mike Scott Introduction to Jazz Guitar Chords and Comping Styles -y Mike Scott he folloing lessons introduce some of the asics of azz guitar chords opics include: Some of the most common chord voicings used Intervals

More information

Juan J. Ramirez Sandia National Laboratories Albuquerque, New Mexico The System Designs

Juan J. Ramirez Sandia National Laboratories Albuquerque, New Mexico The System Designs E-BEAM PULSEWDTH SCALNG FOR A LARGE KrF LASER* Juan J. Ramirez Sandia National Laboratories Albuquerque, Ne Mexico 87185 Summary Electron beam generator engineering trade-offs involved in decreasing the

More information

BALANCING MONEY AND EXCELLING AT IT TOO! MODELING THE LAW OF THE LEVER NAME:

BALANCING MONEY AND EXCELLING AT IT TOO! MODELING THE LAW OF THE LEVER NAME: BALANCING MONEY AND EXCELLING AT IT TOO! MODELING THE LAW OF THE LEVER NAME: Resource Key DATE: PERIOD: Today you ill collect and analyze data using a modified seesa. Your goal ill be to find the relationship

More information

Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes

Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes 7th Mediterranean Conference on Control & Automation Makedonia Palace, Thessaloniki, Greece June 4-6, 009 Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes Theofanis

More information

Optical Networks with Limited Wavelength Conversion.

Optical Networks with Limited Wavelength Conversion. Practical Routing and Wavelength Assignment algorithms for All Optical Networks with Limited Wavelength Conversion M.D. Swaminathan*, Indian Institute of Science, Bangalore, India. Abstract We present

More information

An Efficient Method for Vehicle License Plate Detection in Complex Scenes

An Efficient Method for Vehicle License Plate Detection in Complex Scenes Circuits and Systems, 011,, 30-35 doi:10.436/cs.011.4044 Published Online October 011 (http://.scirp.org/journal/cs) An Efficient Method for Vehicle License Plate Detection in Complex Scenes Abstract Mahmood

More information

Link State Routing Overhead in Mobile Ad Hoc Networks: A Rate-Distortion Formulation

Link State Routing Overhead in Mobile Ad Hoc Networks: A Rate-Distortion Formulation Link State Routing Overhead in Mobile Ad Hoc Netorks: A Rate-Distortion Formulation Di Wang and Alhussein A. Abouzeid Department of Electrical, Computer and Systems Engineering Rensselaer Polytechnic Institute

More information

Optimal Multicast Routing in Ad Hoc Networks

Optimal Multicast Routing in Ad Hoc Networks Mat-2.108 Independent esearch Projects in Applied Mathematics Optimal Multicast outing in Ad Hoc Networks Juha Leino 47032J Juha.Leino@hut.fi 1st December 2002 Contents 1 Introduction 2 2 Optimal Multicasting

More information

Basic Relationship Formulation of the Sundatang Physical Characteristics

Basic Relationship Formulation of the Sundatang Physical Characteristics Basic Relationship ormulation of the Sundatang Physical Characteristics Ronald Yusri Batahong * & Jedol Dayou Department of Science and Mathematics, Institut Pendidikan Guru Kampus Keningau, Locked Bag,

More information

Fundamentals Lecture (topic: non-harmonic tones) (N.B. Class activities are in bold, keywords in italics)

Fundamentals Lecture (topic: non-harmonic tones) (N.B. Class activities are in bold, keywords in italics) undamentals Lecture (topic: nonharmonic tones) (NB lass activities are in old, keyords in italics) I Exposure to concept Distriute handout pg 1 Have the class sing the melody of the first 6 ars of "My

More information

A Distributed Power Management Policy for Wireless Ad Hoc Networks

A Distributed Power Management Policy for Wireless Ad Hoc Networks A Distributed Poer Management Policy for ireless Ad Hoc Netorks Carla F. Chiasserini Dipartimento di Elettronica Politecnico di Torino Torino, Italy chiasserini@polito.it Ramesh R. Rao Center for ireless

More information

Seismic Response of Cellwise Braced Reinforced Concrete Frames

Seismic Response of Cellwise Braced Reinforced Concrete Frames International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Kulkarni

More information

Fast Placement Optimization of Power Supply Pads

Fast Placement Optimization of Power Supply Pads Fast Placement Optimization of Power Supply Pads Yu Zhong Martin D. F. Wong Dept. of Electrical and Computer Engineering Dept. of Electrical and Computer Engineering Univ. of Illinois at Urbana-Champaign

More information

Evaluation of Large Integer Multiplication Methods on Hardware

Evaluation of Large Integer Multiplication Methods on Hardware Evaluation of Large Integer Multiplication Methods on Hardare Rafferty, C., O'Neill, M., & Hanley, N. (217). Evaluation of Large Integer Multiplication Methods on Hardare. IEEE Transactions on Computers.

More information

Chapter 3. Communication and Data Communications Table of Contents

Chapter 3. Communication and Data Communications Table of Contents Chapter 3. Communication and Data Communications Table of Contents Introduction to Communication and... 2 Context... 2 Introduction... 2 Objectives... 2 Content... 2 The Communication Process... 2 Example:

More information

INTRODUCTION OVERVIEW OF WLS/GPS MINIMUM-VARIANCE HYBRID ALGORITHM

INTRODUCTION OVERVIEW OF WLS/GPS MINIMUM-VARIANCE HYBRID ALGORITHM Design and Performance of a Minimum- Variance Hybrid Location Algorithm Utilizing and Cellular Received Signal Strength for Positioning in Dense Urban Environments David S. De Lorenzo, Stanford University

More information

EXAMINATION PAPER NUMBER OF PAGES: 5

EXAMINATION PAPER NUMBER OF PAGES: 5 EXAMINATION PAPER SUBJECT: CHAMBER OF MINES OF SOUTH AFRICA CERT. IN STRATA CONTROL (COAL) SUBJECT CODE: COMCSC EXAMINATION DATE: 4 OCTOBER 007 TIME: 09h00-1h00 EXAMINER: L MUNSAMY MODERATOR: B MADDEN

More information

Determining MTF with a Slant Edge Target ABSTRACT AND INTRODUCTION

Determining MTF with a Slant Edge Target ABSTRACT AND INTRODUCTION Determining MTF with a Slant Edge Target Douglas A. Kerr Issue 2 October 13, 2010 ABSTRACT AND INTRODUCTION The modulation transfer function (MTF) of a photographic lens tells us how effectively the lens

More information

THERE is a growing need for high-performance and. Static Leakage Reduction Through Simultaneous V t /T ox and State Assignment

THERE is a growing need for high-performance and. Static Leakage Reduction Through Simultaneous V t /T ox and State Assignment 1014 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 24, NO. 7, JULY 2005 Static Leakage Reduction Through Simultaneous V t /T ox and State Assignment Dongwoo Lee, Student

More information

Major Features. Safety Precautions. Operation Manual. Thank you for selecting the ZOOM 508 (hereafter simply called the "508").

Major Features. Safety Precautions. Operation Manual. Thank you for selecting the ZOOM 508 (hereafter simply called the 508). Operation Manual Thank you for selecting the ZOOM 508 (hereafter simply called the "508"). Please take the time to read this manual carefully so you can get the most out of your 508 and ensure optimum

More information

A Study of Dynamic Routing and Wavelength Assignment with Imprecise Network State Information

A Study of Dynamic Routing and Wavelength Assignment with Imprecise Network State Information A Study of Dynamic Routing and Wavelength Assignment with Imprecise Network State Information Jun Zhou Department of Computer Science Florida State University Tallahassee, FL 326 zhou@cs.fsu.edu Xin Yuan

More information

The Development of High Precision Applications with GALILEO

The Development of High Precision Applications with GALILEO The Development of High Precision Applications ith GALILEO M. Martin-Neira*, R. Lucas*, A. Garcia*, M. Tossaint*, F. Amarillo* (*)European Space Agency - ESTEC, P.O. Box 299 2200 AG Noordijk ZH The Netherlands

More information

PHYS289 Lecture 4. Electronic Circuits

PHYS289 Lecture 4. Electronic Circuits PYS89 Lecture 4 Electronic ircuits ourse Web Page http://people.physics.tamu.edu/depoy/pys89.html Up no ontains All lecture notes PDF Useful links Last lecture Waveforms, frequencies, etc. Often useful

More information

TECHNOLOGY scaling, aided by innovative circuit techniques,

TECHNOLOGY scaling, aided by innovative circuit techniques, 122 IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 14, NO. 2, FEBRUARY 2006 Energy Optimization of Pipelined Digital Systems Using Circuit Sizing and Supply Scaling Hoang Q. Dao,

More information

A Practical Approach to Bitrate Control in Wireless Mesh Networks using Wireless Network Utility Maximization

A Practical Approach to Bitrate Control in Wireless Mesh Networks using Wireless Network Utility Maximization A Practical Approach to Bitrate Control in Wireless Mesh Networks using Wireless Network Utility Maximization EE359 Course Project Mayank Jain Department of Electrical Engineering Stanford University Introduction

More information

BJT AC Analysis CHAPTER OBJECTIVES 5.1 INTRODUCTION 5.2 AMPLIFICATION IN THE AC DOMAIN

BJT AC Analysis CHAPTER OBJECTIVES 5.1 INTRODUCTION 5.2 AMPLIFICATION IN THE AC DOMAIN BJT AC Analysis 5 CHAPTER OBJECTIVES Become familiar with the, hybrid, and hybrid p models for the BJT transistor. Learn to use the equivalent model to find the important ac parameters for an amplifier.

More information

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,

More information

On Signaling-Free Failure Dependent Restoration in All-Optical Mesh Networks

On Signaling-Free Failure Dependent Restoration in All-Optical Mesh Networks On Signaling-Free Failure Dependent Restoration in All-Optical Mesh Networks János Tapolcai, Pin-Han Ho, Péter Babarczi, Lajos Rónyai MTA-BME Future Internet Research Group, Budapest University of Technology

More information

Major Features. Safety Precautions. Operation Manual. Thank you for selecting the ZOOM 509 (hereafter simply called the "509").

Major Features. Safety Precautions. Operation Manual. Thank you for selecting the ZOOM 509 (hereafter simply called the 509). Operation Manual Thank you for selecting the ZOOM 509 (hereafter simply called the "509"). Please take the time to read this manual carefully so you can get the most out of your 509 and ensure optimum

More information