EECS 498 Introduction to Distributed Systems
|
|
- Emery Burns
- 5 years ago
- Views:
Transcription
1 EECS 498 Introduction to Distributed Systems Fall 2017 Harsha V. Madhyastha
2 Replicated State Machine Replica 2 Replica 1 Replica 3 Are we done now that we have logical clocks? Failures! Clients September 18, 2017 EECS 498 Lecture 4 2
3 RSMs with Logical Clocks Any replica can execute an update only after confirming clock is higher on all other replicas Implication: If any one replica is down, all other replicas cannot progress September 18, 2017 EECS 498 Lecture 4 3
4 Types of failures Crash failures Can resume with saved state Fail stop All state is lost upon failure September 18, 2017 EECS 498 Lecture 4 4
5 Recovering from failures Checkpoint process state periodically Where to store checkpoint? Persistent storage vs. volatile memory Local machine vs. remote machine Where you store checkpoint depends on Types of failures you want to tolerate Performance overhead you are willing to bear Resume from last checkpoint after restart September 18, 2017 EECS 498 Lecture 4 5
6 Challenge in Checkpointing m 1 m 3 m 4 m 6 m 7 m 2 m 5 m 8 P3 September 18, 2017 EECS 498 Lecture 4 6
7 Challenge in Checkpointing m 1 m 3 m 4 m 6 m 7 m 2 m 5 m 8 P3 September 18, 2017 EECS 498 Lecture 4 7
8 Challenge in Checkpointing m 1 m 3 m 4 m 6 m 7 m 2 m 5 P3 September 18, 2017 EECS 498 Lecture 4 8
9 Challenge in Checkpointing m 1 m 3 m 4 m 6 m 2 m 5 P3 September 18, 2017 EECS 498 Lecture 4 9
10 Challenge in Checkpointing m 1 m 3 m 4 m 2 m 5 P3 September 18, 2017 EECS 498 Lecture 4 10
11 Challenge in Checkpointing m 1 m 3 m 4 m 2 P3 September 18, 2017 EECS 498 Lecture 4 11
12 Challenge in Checkpointing m 1 m 3 m 2 P3 September 18, 2017 EECS 498 Lecture 4 12
13 Challenge in Checkpointing m 1 m 2 P3 September 18, 2017 EECS 498 Lecture 4 13
14 Challenge in Checkpointing m 1 P3 September 18, 2017 EECS 498 Lecture 4 14
15 Challenge in Checkpointing P3 September 18, 2017 EECS 498 Lecture 4 15
16 Checkpoint-based Recovery Problem: Domino effect Cause: Uncoordinated checkpointing Coordinated checkpointing Example: Chandy-Lamport snapshot Global snapshot of a distributed system September 18, 2017 EECS 498 Lecture 4 16
17 Example September 18, 2017 EECS 498 Lecture 4 17
18 Chandy-Lamport algorithm How to take a snapshot of a distributed system? Example use cases: Deadlock detection Garbage collection Evaluation of any stable property September 18, 2017 EECS 498 Lecture 4 18
19 Example: Token ring m 1 m 2 m 3 P3 September 18, 2017 EECS 498 Lecture 4 19
20 Example snapshot 1 m 1 m 2 m 3 P3 September 18, 2017 EECS 498 Lecture 4 20
21 Example snapshot 2 m 1 m 2 m 3 P3 September 18, 2017 EECS 498 Lecture 4 21
22 Global snapshot Captured state must satisfy happens before If event b in snapshot and a à b, then event a must be in snapshot September 18, 2017 EECS 498 Lecture 4 22
23 Example desired snapshot m 1 m 2 m 3 P3 September 18, 2017 EECS 498 Lecture 4 23
24 Global snapshot Goals of capturing global snapshot Capture instantaneous state of every process Capture relevant messages in transit What comprises a distributed system s state? State of individual processes State of every communication channel September 18, 2017 EECS 498 Lecture 4 24
25 Chandy-Lamport Snapshot N processes in the system Processes don t fail while taking snapshot Any process may initiate collection of snapshot One unidirectional channel in either direction between each pair of processes All channels ensure FIFO delivery Lossless and no duplication September 18, 2017 EECS 498 Lecture 4 25
26 Chandy-Lamport Snapshot m 1 m 2 September 18, 2017 EECS 498 Lecture 4 26
27 Chandy-Lamport: Intuition Enable snapshot by broadcasting marker message Distinct from the application s messages Marker messages serve two purposes: 1. Enable processes to discover need for snapshot 2. Serve as a barrier on every channel Record all messages received before marker September 18, 2017 EECS 498 Lecture 4 27
28 Chandy-Lamport Snapshot m 1 m 2 m 1 m 2 September 18, 2017 EECS 498 Lecture 4 28
29 Chandy-Lamport Snapshot Initiator process does the following: Records its local state Sends out marker messages on every outgoing channel Starts recording messages on every incoming channel Two cases for how P i should handle receipt of marker message from P j September 18, 2017 EECS 498 Lecture 4 29
30 Chandy-Lamport Snapshot If first marker message received by P i Record local state Record state of channel from P j to P i as empty Send marker messages on all outgoing channels If duplicate marker message Stop recording channel from P j to P i Record state of channel as all messages received since marker Snapshot complete when every process has received marker on every incoming channel September 18, 2017 EECS 498 Lecture 4 30
31 Chandy-Lamport in action m 1 m 2 m 3 P3 September 18, 2017 EECS 498 Lecture 4 31
32 Coordinated checkpointing When to initiate global snapshot? External environment does not checkpoint Cannot roll back output Cannot re-issue inputs Implication: Need coordinated checkpoint upon input or output Too slow! September 18, 2017 EECS 498 Lecture 4 32
33 Challenge in Checkpointing m 1 m 3 m 4 m 6 m 7 m 2 m 5 m 8 P3 September 18, 2017 EECS 498 Lecture 4 33
34 Challenge in Checkpointing m 1 m 3 m 4 m 6 m 7 m 2 m 5 m 8 P3 September 18, 2017 EECS 498 Lecture 4 34
35 Challenge in Checkpointing m 1 m 3 m 4 m 6 m 7 m 2 m 5 m 8 P3 September 18, 2017 EECS 498 Lecture 4 35
36 Message logging Between checkpoints, log all events that lead to non-determinism For example, log every message received Log everything necessary to ensure same messages are sent as in original execution September 18, 2017 EECS 498 Lecture 4 36
Global State and Gossip
Global State and Gossip CS 240: Computing Systems and Concurrency Lecture 6 Marco Canini Credits: Indranil Gupta developed much of the original material. Today 1. Global snapshot of a distributed system
More informationDistributed Systems. Clocks, Ordering, and Global Snapshots
Distributed Systems Clocks, Ordering, and Global Snapshots Björn Franke University of Edinburgh Logical clocks Why do we need clocks? To determine when one thing happened before another Can we determine
More informationOutline for February 6, 2001
Outline for February 6, 2001 ECS 251 Winter 2001 Page 1 Outline for February 6, 2001 1. Greetings and felicitations! a. Friday times good, also Tuesday 3-4:30. Please send me your preferences! 2. Global
More informationSynchronisation in Distributed Systems
Synchronisation in Distributed Systems Distributed Systems Sistemi Distribuiti Andrea Omicini andrea.omicini@unibo.it Ingegneria Due Alma Mater Studiorum Università di Bologna a Cesena Academic Year 2010/2011
More informationAlgorithm-Based Master-Worker Model of Fault Tolerance in Time-Evolving Applications
Algorithm-Based Master-Worker Model of Fault Tolerance in Time-Evolving Applications Authors: Md. Mohsin Ali and Peter E. Strazdins Research School of Computer Science The Australian National University
More informationSynchronisation in Distributed Systems
Synchronisation in Distributed Systems Distributed Systems Sistemi Distribuiti Andrea Omicini andrea.omicini@unibo.it Dipartimento di Informatica: Scienza e Ingegneria (DISI) Alma Mater Studiorum Università
More informationChapter 4: DataPersistence
Lecture Notes Managing and Mining Multiplayer Online Games Summer Term 8 Chapter : DataPersistence Lecture Notes Matthias Schubert http://www.dbs.ifi.lmu.de/cms/vo_managing_massive_multiplayer_online_games
More informationACR: AUTOMATIC CHECKPOINT/ RESTART FOR SOFT AND HARD ERROR PROTECTION.
ACR: AUTOMATIC CHECKPOINT/ RESTART FOR SOFT AND HARD ERROR PROTECTION. XIANG NI, ESTEBAN MENESES, NIKHIL JAIN, SANJAY KALE PARALLEL PROGRAMMING LAB, UIUC Tuesday, July 9, CONTENTS MOTIVATION ACR FRAMEWORK
More informationPerformance analysis of different checkpointing and recovery schemes using stochastic model
J Parallel Distrib Comput 66 (006) 99 07 wwwelseviercom/locate/jpdc Performance analysis of different checkpointing and recovery schemes using stochastic model Partha Sarathi Mandal, Krishnendu Mukhopadhyaya
More informationThe Part-Time Parliament. Paxos. Supplies. Government 101. Each legislator receives. No two ledgers contain contradictory information
The Part-Time Parliament Paxos Parliament determines laws by passing sequence of numbered decrees Legislators can leave and enter the chamber at arbitrary times No centralized record of approved decrees
More informationA quantitative Comparison of Checkpoint with Restart and Replication in Volatile Environments
A quantitative Comparison of Checkpoint with Restart and Replication in Volatile Environments Rong Zheng and Jaspal Subhlok Houston, TX 774 E-mail: rzheng@cs.uh.edu Houston, TX, 774, USA http://www.cs.uh.edu
More informationDistributed Network Protocols Lecture Notes 1
Distributed Network Protocols Lecture Notes 1 Prof. Adrian Segall Department of Electrical Engineering Technion, Israel Institute of Technology segall at ee.technion.ac.il and Department of Computer Engineering
More informationToday's Lecture. Clocks in a Distributed System. Last Lecture RPC Important Lessons. Need for time synchronization. Time synchronization techniques
Last Lecture RPC Important Lessons Procedure calls Simple way to pass control and data Elegant transparent way to distribute application Not only way Hard to provide true transparency Failures Performance
More informationA Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks
A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks Elisabeth M. Royer, Chai-Keong Toh IEEE Personal Communications, April 1999 Presented by Hannu Vilpponen 1(15) Hannu_Vilpponen.PPT
More informationDistributed Systems. Time Synchronization
15-440 Distributed Systems Time Synchronization Today's Lecture Need for time synchronization Time synchronization techniques Lamport Clocks Vector Clocks 2 Why Global Timing? Suppose there were a globally
More informationFAQ and Solutions. 02 May TM and copyright Imagicle spa
FAQ and Solutions 02 May 2018 TM and copyright 2010-2018 Imagicle spa Table of Contents FAQ and Solutions...1/11 SkyStone and network security settings...1/11 Upgrade procedure to support Skype 7.32...2/11
More informationOutline of the Lecture
CS311: DATA COMMUNICATION Multiplexing by Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Web: http://home.iitj.ac.in/~manaskhatua http://manaskhatua.github.io/
More informationTransaction Log Fundamentals for the DBA
Transaction Log Fundamentals for the DBA Visualize Your Transaction Log Brian Hansen St. Louis, MO September 10, 2016 Brian Hansen 15+ Years working with SQL Server Development work since 7.0 Administration
More informationSupply 12Vdc nominal (9 Vdc minimum, 14,5Vdc maximum ) Max Current Drain. from a , V Carrier Frequency
MIX400 48 CHANNELS WIRELESS RECEIVER ON 8 OUTPUTS TECHNICIAN MANUAL ENGLISH DESCRIPTION Mix 400 is a 48 channel universal wireless receiver, memorizable and free assignable on 8 open-collector outputs.
More informationMultiplexing. Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur
CS311: DATA COMMUNICATION Multiplexing Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur e-mail: manaskhatua@iitj.ac.in Outline of the Lecture What is Multiplexing and why is it used? Basic
More informationScheduling and Optimization of Fault-Tolerant Embedded Systems
Scheduling and Optimization of Fault-Tolerant Embedded Systems, Viacheslav Izosimov, Paul Pop *, Zebo Peng Department of Computer and Information Science (IDA) Linköping University http://www.ida.liu.se/~eslab/
More informationLecture 9: Clocking for High Performance Processors
Lecture 9: Clocking for High Performance Processors Computer Systems Lab Stanford University horowitz@stanford.edu Copyright 2001 Mark Horowitz EE371 Lecture 9-1 Horowitz Overview Reading Bailey Stojanovic
More informationTime Triggered Protocol (TTP/C): A Safety-Critical System Protocol
Time Triggered Protocol (TTP/C): A Safety-Critical System Protocol Literature Review EE382c Fall 1999 Howard Curtis Global Technology Services MCC Robert France Global Software Division Motorola, Inc.
More informationDigital Transmission using SECC Spring 2010 Lecture #7. (n,k,d) Systematic Block Codes. How many parity bits to use?
Digital Transmission using SECC 6.02 Spring 2010 Lecture #7 How many parity bits? Dealing with burst errors Reed-Solomon codes message Compute Checksum # message chk Partition Apply SECC Transmit errors
More informationROM/UDF CPU I/O I/O I/O RAM
DATA BUSSES INTRODUCTION The avionics systems on aircraft frequently contain general purpose computer components which perform certain processing functions, then relay this information to other systems.
More informationPRISM Power Management Modes
PRISM Power Management Modes Application Note February 1997 AN9665 Authors: Carl Andren, Tim Bozych, Bob Rood and Doug Schultz The PRISM chip set and reference radio are capable of reduced power operation
More informationHytera. PD41X Patrol Management System. Installation and Configuration Guide
Hytera PD41X Patrol Management System Installation and Configuration Guide Documentation Version: 01 Release Date: 03-2015 Copyright Information Hytera is the trademark or registered trademark of Hytera
More informationEXPERIMENT 1: Amplitude Shift Keying (ASK)
EXPERIMENT 1: Amplitude Shift Keying (ASK) 1) OBJECTIVE Generation and demodulation of an amplitude shift keyed (ASK) signal 2) PRELIMINARY DISCUSSION In ASK, the amplitude of a carrier signal is modified
More informationTelecommunications Recommendation extension "A" SPECIFICATION FOR COMMON CHANNEL SIGNALLING SYSTEM No. 7. Message Transfer Part /MTP/
Telecommunications Recommendation extension "A" SPECIFICATION FOR COMMON CHANNEL SIGNALLING SYSTEM No. 7 Message Transfer Part /MTP/ ISSUE 1.0 02-2002 References References: -CCITT Blue Book Recommendation
More informationMETAVERSE WALLET USER MANUAL
METAVERSE WALLET USER MANUAL V1.4 applies to version 0.7.1 of the Metaverse Wallet 2017-10-18 The Metaverse operation team CONTENTS 1. Preface... 3 1.1 Purpose... 3 1.2 Background... 3 2. Wallet Overview...
More informationBit Reversal Broadcast Scheduling for Ad Hoc Systems
Bit Reversal Broadcast Scheduling for Ad Hoc Systems Marcin Kik, Maciej Gebala, Mirosław Wrocław University of Technology, Poland IDCS 2013, Hangzhou How to broadcast efficiently? Broadcasting ad hoc systems
More informationModule 4: Combinational Logic Glitches and Hazards
Module 4: Combinational Logic Glitches and Hazards Wakerly: Chapter 4 (part 3) : ECEN 3233 r. Keith. Teague Spring 23 23 TIME RESPONSE in Combinational Networks emphasis on timing behavior of circuits
More informationSynchronous Atomic Broadcast for Redundant Broadcast. Channels. Flaviu Cristian. University of California, San Diego. La Jolla, CA
Synchronous Atomic Broadcast for Redundant Broadcast Channels Flaviu Cristian Department of Computer Science & Engineering University of California, San Diego La Jolla, CA 92093 0114 Abstract We propose
More informationRelationship to theory: This activity involves the motion of bodies under constant velocity.
UNIFORM MOTION Lab format: this lab is a remote lab activity Relationship to theory: This activity involves the motion of bodies under constant velocity. LEARNING OBJECTIVES Read and understand these instructions
More informationSingle Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors
Single Error Correcting Codes (SECC) Basic idea: Use multiple parity bits, each covering a subset of the data bits. No two message bits belong to exactly the same subsets, so a single error will generate
More informationKing Fahd University of Petroleum & Minerals Computer Engineering Dept
King Fahd University of Petroleum & Minerals Computer Engineering Dept COE 342 Data and Computer Communications Term 021 Dr. Ashraf S. Hasan Mahmoud Rm 22-144 Ext. 1724 Email: ashraf@ccse.kfupm.edu.sa
More informationMultiple Access. Difference between Multiplexing and Multiple Access
Multiple Access (MA) Satellite transponders are wide bandwidth devices with bandwidths standard bandwidth of around 35 MHz to 7 MHz. A satellite transponder is rarely used fully by a single user (for example
More informationWelcome to Hellfire Multi Player. Game Version 3.3
Welcome to Hellfire Multi Player Game Version 3.3 Hellfire Multiplayer Overview Hellfire V3.3 introduces the ability to play multiplayer games, where several players can compete by playing the same week
More informationDetailed description of a dynamic game. (i) Players Nature, M, and W. Extensive Form. (ii) Game Tree. (ii) Game Tree
(a) Extensive orm Representation of Dynamic Games (a) Extensive orm Representation of Dynamic Games Example: Man and oman going out for a date Detailed description of a dynamic game ootball () or hopping
More informationBroadcast Approach for UMTS Mobility Database Recovery. Sok-Ian Sou ( 蘇淑茵 ), EE, NCKU
Broadcast Approach for UMTS Mobility Database Recovery Sok-Ian Sou ( 蘇淑茵 ), EE, NCKU 1 Outlines Background GPRS MM/SM Broadcast Approach Analytic Model Numerical Results Conclusions 2 Background 3 台灣電信業務開放近程
More informationperformance modeling. He is a subject area editor of the Journal of Parallel and Distributed Computing, an associate editor
VLR at the last HLR checkpointing). Thus, the expected number of HLR records need to be updated (with respect to the VLR) in the HLR restoration process is X E[N U ] = np n (7) 0n1 Let E[N V ] be the expected
More informationSuitable firmware can be found on Anritsu's web site under the instrument library listings.
General Caution Please use a USB Memory Stick for firmware updates. Suitable firmware can be found on Anritsu's web site under the instrument library listings. If your existing firmware is older than v1.19,
More informationAppendix C T1 Overview
Appendix C T Overview GENERAL T refers to the primary digital telephone carrier system used in North America. T is one line type of the PCM T-carrier hierarchy listed in Table C-. T describes the cabling,
More informationCSE 461 Bits and Links. David Wetherall
CSE 461 Bits and Links David Wetherall djw@cs.washington.edu Topic How do we send a message across a wire or wireless link? The physical/link layers: 1. Different kinds of media 2. Fundamental limits 3.
More informationEfficient Detection of Channel Predicates in Distributed Systems 1
Efficient Detection of Channel Predicates in Distributed Systems 1 V. K. Garg C. M. Chase Richard Kilgore J. Roger Mitchell January 19, 1995 1 This paper is an extended and substially revised version of
More informationMXD6240/6241AU. Autonomous 8-Angle Tip-Over Sensor with High Vibration Immunity
Autonomous 8-Angle Tip-Over Sensor with High Vibration Immunity MXD6240/6241AU FEATURES 8 Pin-programmable angle thresholds Single-wire digital output Fully autonomous- no uc required Built-in self-test
More informationOperations Plan EMRG-106 Version: 1.0
EMRG-106 Operations Plan EMERGENCY MEASURES RADIO GROUP OTTAWA ARES Two Names - One Group - One Purpose Operations Plan EMRG-106 Version: 1.0 EMRG Public This document is classified as PUBLIC, meaning
More informationLec 19 Error and Loss Control I: FEC
Multimedia Communication Lec 19 Error and Loss Control I: FEC Zhu Li Course Web: http://l.web.umkc.edu/lizhu/teaching/ Z. Li, Multimedia Communciation, Spring 2017 p.1 Outline ReCap Lecture 18 TCP Congestion
More informationGSM-4 (program version 4.02)
COMMUNICATION MODULE GSM-4 (program version 4.02) OPERATING INSTRUCTION GDAŃSK, POLAND gsm4_e 11/03 WARNING For safety reasons, the module should only be installed by qualified personnel. In order to avoid
More informationFall 2015 COMP Operating Systems. Lab #7
Fall 2015 COMP 3511 Operating Systems Lab #7 Outline Review and examples on virtual memory Motivation of Virtual Memory Demand Paging Page Replacement Q. 1 What is required to support dynamic memory allocation
More informationNEW vsphere Replication Enhancements & Best Practices
INF-BCO1436 NEW vsphere Replication Enhancements & Best Practices Lee Dilworth, VMware, Inc. Rahul Ravulur, VMware, Inc. #vmworldinf Disclaimer This session may contain product features that are currently
More informationLecture 3: Modulation & Clock Recovery. CSE 123: Computer Networks Stefan Savage
Lecture 3: Modulation & Clock Recovery CSE 123: Computer Networks Stefan Savage Lecture 3 Overview Signaling constraints Shannon s Law Nyquist Limit Encoding schemes Clock recovery Manchester, NRZ, NRZI,
More informationHow to Guide: Controlling Blinds in C-Bus
How to Guide: Controlling Blinds in C-Bus This document is a guide to controlling electrical blinds with C-Bus. Part 1 shows how the blind could be controlled by C-Bus directly and part 2 shows how C-Bus
More informationOOO Execution & Precise State MIPS R10000 (R10K)
OOO Execution & Precise State in MIPS R10000 (R10K) Nima Honarmand CDB. CDB.V Spring 2018 :: CSE 502 he Problem with P6 Map able + Regfile value R value Head Retire Dispatch op RS 1 2 V1 FU V2 ail Dispatch
More informationRPR Protection Gal Mor, Corrigent Systems Jim Kao, Cisco Systems
RPR Protection, Corrigent Systems, Cisco Systems Requirements Protection within 50 msec Wrap protection is required Packets may indicate Steering Only Data (SWIS) Steer protection is optional Use Topology
More informationSystem Failure Operational Recovery
System Failure Operational Recovery VLBI data acquisition is a complex technical challenge for operators using various electronic data acquisition systems, large radio telescopes that use various drive
More informationMotorola APX. G1 SCBA Radio Pairing Guide Motorola APX. G1 SCBA Radio Pairing Guide for
G1 SCBA Radio Pairing Guide for Motorola APX APX 4000 Series APX 5000 Series APX 6000 Series APX 7000 Series APX 8000 Series Motorola APX Configuration Settings 2 Motorola APX Screen Navigation 4 Creating
More information- 1 - Rep. ITU-R M.2009 REPORT ITU-R M.2009 DIRECT-DIAL TELEPHONE SYSTEMS FOR THE MARITIME MOBILE SERVICE
- 1 - REPORT ITU-R M.2009 DIRECT-DIAL TELEPHONE SYSTEMS FOR THE MARITIME MOBILE SERVICE (1995) General Although the DSC system may be used to establish fully automatic systems in the directions ship-to-shore,
More information) IGNALLING LINK. SERIES Q: SWITCHING AND SIGNALLING Specifications of Signalling System No. 7 Message transfer part. ITU-T Recommendation Q.
INTERNATIONAL TELECOMMUNICATION UNION )454 1 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (07/96) SERIES Q: SWITCHING AND SIGNALLING Specifications of Signalling System. 7 Message transfer part 3IGNALLING
More informationProject 1: Game of Bricks
Project 1: Game of Bricks Game Description This is a game you play with a ball and a flat paddle. A number of bricks are lined up at the top of the screen. As the ball bounces up and down you use the paddle
More informationHCA Tech Note 102. Checkbox Control. Home Mode aka Green Mode
Checkbox Control There is a lot you can do in HCA to achieve many functions within your home without any programs or schedules. These features are collectively called Checkbox control as many of the items
More informationCSEP 561 Bits and Links. David Wetherall
CSEP 561 Bits and Links David Wetherall djw@cs.washington.edu Topic How do we send a message across a wire or wireless link? The physical/link layers: 1. Different kinds of media 2. Fundamental limits
More informationThe Capability of Error Correction for Burst-noise Channels Using Error Estimating Code
The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code Yaoyu Wang Nanjing University yaoyu.wang.nju@gmail.com June 10, 2016 Yaoyu Wang (NJU) Error correction with EEC June
More informationAMBA Generic Infra Red Interface
AMBA Generic Infra Red Interface Datasheet Copyright 1998 ARM Limited. All rights reserved. ARM DDI 0097A AMBA Generic Infra Red Interface Datasheet Copyright 1998 ARM Limited. All rights reserved. Release
More informationLecture 3: Modulation & Clock Recovery. CSE 123: Computer Networks Alex C. Snoeren
Lecture 3: Modulation & Clock Recovery CSE 123: Computer Networks Alex C. Snoeren Lecture 3 Overview Signaling constraints Shannon s Law Nyquist Limit Encoding schemes Clock recovery Manchester, NRZ, NRZI,
More informationOPCA FICTION SUMMARY. September 12, 2016
OPCA FICTION SUMMARY 1 September 12, 2016 OPCA TV FICTION, KEY TAKEAWAYS o French fiction has a solid audience but is often difficult to finance; o There s inconsistency between the value of writers and
More informationExactly-once Delivery. Ján /
Exactly-once Delivery Ján Antala @janantala / j.antala@pygmalios.com Kafka: on-disk circular buffer distributed, fast, resilient Publish & subscribe, like MQ Real time data streaming Distributed replicated
More informationBasic Harris DX Transmitter Tutorial
BASIC DX TUTORIAL Basic Harris DX Transmitter Tutorial Basic DX Theory The Harris DX Transmitters series, introduced in 1986, have proven to be the most efficient method of Amplitude Modulation at medium
More informationTIBCO FTL Part of the TIBCO Messaging Suite. Quick Start Guide
TIBCO FTL 6.0.0 Part of the TIBCO Messaging Suite Quick Start Guide The TIBCO Messaging Suite TIBCO FTL is part of the TIBCO Messaging Suite. It includes not only TIBCO FTL, but also TIBCO eftl (providing
More informationMultiple Access System
Multiple Access System TDMA and FDMA require a degree of coordination among users: FDMA users cannot transmit on the same frequency and TDMA users can transmit on the same frequency but not at the same
More informationThank You & Welcome Confirmation Invoice Enclosed
The Foundation for a Mindful Society FIRST CLASS MAIL window: 3.625 x 1.375. 13/16 from left. 2 from top. Thank You & Welcome Confirmation Invoice Enclosed The Foundation for a Mindful Society Please return
More informationDetecting and Correcting Bit Errors. COS 463: Wireless Networks Lecture 8 Kyle Jamieson
Detecting and Correcting Bit Errors COS 463: Wireless Networks Lecture 8 Kyle Jamieson Bit errors on links Links in a network go through hostile environments Both wired, and wireless: Scattering Diffraction
More informationReliable and Total Order Broadcast in the Crash-Recovery Model
Reliable and Total Order Broadcast in the Crash-Recovery Model Romain Boichat Rachid Guerraoui Communication Systems Department Siss Federal Institute of Technology CH - 1015 Lausanne Abstract This paper
More informationCS 621 Mobile Computing
Lecture 11 CS 621 Mobile Computing Location Management for Mobile Cellular Systems Zubin Bhuyan, Department of CSE, Tezpur University http://www.tezu.ernet.in/~zubin Several slides and images in this presentation
More informationFLDIGI Users Manual: WEFAX
w1hkj.com 10-13 minutes This modem is able to receive and transmit HF-Fax images, traditionally used for weather reports. More technical information is available on the wikipedia article Radiofax. Two
More informationRPR Topology Discovery Proposal
RPR Topology Discovery Proposal Jeanne De Jaegher, Alcatel Jason Fan, Luminous Henry Hsiaw, NEC John Lemon, Lantern Robin Olsson, Vitesse Harry Peng, Nortel Frederic Thepot, Dynarc 1 Components of a complete
More informationM U LT I C A S T C O M M U N I C AT I O N S. Tarik Cicic
M U LT I C A S T C O M M U N I C AT I O N S Tarik Cicic 9..08 O V E R V I E W One-to-many communication, why and how Algorithmic approach: Steiner trees Practical algorithms Multicast tree types Basic
More informationSimulation Case study
CSA2181 (Simulation Part ) Simulation A simple distributed architecture for emergency response exercises A simple distributed simulation for support of emergency response exercises. Immersive Synthetic
More informationINSTALLATION INSTRUCTIONS FOR SYMCOM S MODEL 77C-LR-KW/HP ELECTRONIC OVERLOAD RELAY
INSTALLATION INSTRUCTIONS FOR SYMCOM S MODEL 77C-LR-KW/HP ELECTRONIC OVERLOAD RELAY BE SURE POWER IS DISCONNECTED PRIOR TO INSTALLATION! FOLLOW NATIONAL, STATE AND LOCAL CODES. READ THESE INSTRUCTIONS
More informationDepartment of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009.
Department of Computer Science and Engineering CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009 Final Examination Instructions: Examination time: 180 min. Print your name
More informationS! Applications & Widgets
S! Appli...-2 Using S! Applications... -2 Mobile Widget... -3 Customizing Standby Display (Japanese)... -3 Additional Functions... -6 Troubleshooting... - S! Applications & Widgets -1 S! Appli Using S!
More informationEXPERIMENT 2: Frequency Shift Keying (FSK)
EXPERIMENT 2: Frequency Shift Keying (FSK) 1) OBJECTIVE Generation and demodulation of a frequency shift keyed (FSK) signal 2) PRELIMINARY DISCUSSION In FSK, the frequency of a carrier signal is modified
More informationPrintables for Three in a Line - make 20, 60 or 100
Printables for Three in a Line - make 20, 60 or 100 KNPIG ID # T 5525.4 This file contains printables for two students. For each additional student print 1 game board and student recording sheet. Game
More informationECT-215 Homework #1 Solution Set Chapter 14 Problems 1-29
Scoring: 1 point per problem, 29 points total. ECT-215 Homework #1 Solution Set Chapter 14 Problems 1-29 1. For the system of figure 14-1, give the binary code output that will result for each of the following
More informationINF8574 GENERAL DESCRIPTION
GENERAL DESCRIPTION The INF8574 is a silicon CMOS circuit. It provides general purpose remote I/O expansion for most microcontroller families via the two-line bidirectional bus (I 2 C). The device consists
More informationLink State Routing. Stefano Vissicchio UCL Computer Science CS 3035/GZ01
Link State Routing Stefano Vissicchio UCL Computer Science CS 335/GZ Reminder: Intra-domain Routing Problem Shortest paths problem: What path between two vertices offers minimal sum of edge weights? Classic
More informationEECS 579 Fall What is Testing?
EECS 579 Fall 2001 Recap Text (new): Essentials of Electronic Testing by M. Bushnell & V. Agrawal, Kluwer, Boston, 2000. Class Home Page: http://www.eecs.umich.edu/courses/eecs579 Lecture notes and other
More informationImplementing Logic with the Embedded Array
Implementing Logic with the Embedded Array in FLEX 10K Devices May 2001, ver. 2.1 Product Information Bulletin 21 Introduction Altera s FLEX 10K devices are the first programmable logic devices (PLDs)
More informationEE 42/100 Lecture 24: Latches and Flip Flops. Rev A 4/14/2010 (8:30 PM) Prof. Ali M. Niknejad
A. M. Niknejad University of California, Berkeley EE 100 / 42 Lecture 24 p. 1/15 EE 42/100 Lecture 24: Latches and Flip Flops ELECTRONICS Rev A 4/14/2010 (8:30 PM) Prof. Ali M. Niknejad University of California,
More informationRFID Anti-Collision System Using the Spread Spectrum Technique
Using the Spread Spectrum Technique Document ID: PG-TR-050426-AR Date: 26 April 2005 Anil Rohatgi 777 Atlantic Ave. Atlanta GA 30332-0250 Voice: (404)894-8169 Fax: (404)894-5935 http://www.propagation.gatech.edu
More informationSwitching Circuits & Logic Design
Switching Circuits & Logic Design JieHong Roland Jiang 江介宏 Department of Electrical Engineering National Taiwan University all 22 4 Derivation of Graphs and Tables Network motifs in developmental transcription
More informationMobile & Wireless Networking. Lecture 4: Cellular Concepts & Dealing with Mobility. [Reader, Part 3 & 4]
192620010 Mobile & Wireless Networking Lecture 4: Cellular Concepts & Dealing with Mobility [Reader, Part 3 & 4] Geert Heijenk Outline of Lecture 4 Cellular Concepts q Introduction q Cell layout q Interference
More informationA Distributed Virtual Reality Prototype for Real Time GPS Data
A Distributed Virtual Reality Prototype for Real Time GPS Data Roy Ladner 1, Larry Klos 2, Mahdi Abdelguerfi 2, Golden G. Richard, III 2, Beige Liu 2, Kevin Shaw 1 1 Naval Research Laboratory, Stennis
More informationIn this lecture. System Model Power Penalty Analog transmission Digital transmission
System Model Power Penalty Analog transmission Digital transmission In this lecture Analog Data Transmission vs. Digital Data Transmission Analog to Digital (A/D) Conversion Digital to Analog (D/A) Conversion
More informationInventory Manual. Version 3. Hart ID = Have a question? Call Hart Client Care at , or us at
Version 3 Hart ID = 924-01 Inventory Manual Review Equipment & Supplies page 2 About Hart Scanners page 4 Register Scanners page 6 Place Fixture Stickers page 8 Enter Sticker Ranges page 14 Scanning Basics
More informationCANopen Programmer s Manual Part Number Version 1.0 October All rights reserved
Part Number 95-00271-000 Version 1.0 October 2002 2002 All rights reserved Table Of Contents TABLE OF CONTENTS About This Manual... iii Overview and Scope... iii Related Documentation... iii Document Validity
More informationATLAS. P25 Systems. LMR communications made simple.
P25 Systems LMR communications made simple. We make your critical communication system safe and simple to use. IS THE MOST MODERN & FLEXIBLE P25 SYSTEM Our patented Latitude technology makes the P25 application
More informationENGIN 112 Intro to Electrical and Computer Engineering
ENGIN 112 Intro to Electrical and Computer Engineering Lecture 28 Timing Analysis Overview Circuits do not respond instantaneously to input changes Predictable delay in transferring inputs to outputs Propagation
More informationDESCRIPTION NOTE. Power Supply MODEL 2200A PM
Instantly integrate any standard power meter with a pulse output into the LonWorks digital network. The firmware executes on a NeuroLogic Research Model 2200A and provides a low-cost interface to two power
More informationEffects and Mitigation of Post-Fault Commutation Failures in Line-Commutated HVDC Transmission System
IEEE International Symposium on Industrial Electronics (ISIE 9) Seoul Olympic Parktel, Seoul, Korea July 5-8, 9 Effects and Mitigation of Post-Fault Commutation Failures in Line-Commutated HVDC Transmission
More information