On Available Bandwidth in FDDI-Based Recongurable Networks. Sanjay Kamat, Gopal Agrawal, and Wei Zhao. Texas A&M University.

Size: px
Start display at page:

Download "On Available Bandwidth in FDDI-Based Recongurable Networks. Sanjay Kamat, Gopal Agrawal, and Wei Zhao. Texas A&M University."

Transcription

1 On Avaiabe Bandwidth in FDDI-Based Recongurabe Networks Sanjay Kamat, Gopa Agrawa, and Wei Zhao Department of Computer Science Teas A&M University Coege Station, Teas Abstract The increasing use of high-speed networks in mission safety critica appications has ed to a growing concern for reiabiity issues in network design. The conventiona approaches to evauating network reiabiity in terms of their connectivity or mean time to faiure are often not sucient to characterize the network reiabiity. A better measure of system reiabiity shoud quantitativey reect trac carrying capacity of the network in the presence of fauts. In this paper, we present a probabiistic anaysis of the avaiabe bandwidth of FDDI-based recongurabe networks given the number of ink fauts. Three networks of varying degree of recongurabiity are considered: fuy recongurabe, partiay recongurabe, and non-recongurabe networks. The partiay recongurabe networks are found to be an eceent compromise between high reiabiity and the ease of impementation. A method of impementing the partiay recongurabe network using eisting FDDI technoogy is proposed. 1

2 Contents 1 Introduction Background : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Previous work : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : About this paper : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 2 2 The network architectures Network mode : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Faut mode : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Reconguration capabiities of FBRNs : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Three network architectures : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Reconguration agorithm for an FBRN : : : : : : : : : : : : : : : : : : : : : : : : : : : 6 3 Anaysis of avaiabe bandwidth Metrics : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Computing A(; ) : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Non-recongurabe network : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Fuy recongurabe network : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Partiay recongurabe network : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Theorem for computing AX(; ) : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Numerica resuts : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Computing E[s j ] : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Non-recongurabe network : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Fuy recongurabe network : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Partiay recongurabe network : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Numerica resuts : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Taking wrap-around into account : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 17 4 Concusions 17 5 References 18 2

3 1 Introduction 1.1 Background The use of computer and communication networks in mission safety critica environments is becoming increasingy common. A major concern in the design of such networks is their vunerabiity to fauts or damages inicted by component faiures and/or enemy attacks. The objective of this paper is to address reiabiity issues in FDDI-based networks. Much of the work on network reiabiity has been based on connectivity. In this kind of studies, a network is considered operationa if it is connected, i.e., communication paths eist among a nodes. Measures such as the minimum or average number of fauts that wi disconnect the network are studied. However, in many appications connectivity aone is not sucient to assess the network operationa status. As pointed out by Wikov in [20], a reiabiity measure shoud quantitativey reect the trac-carrying capacity of a network in the presence of fauts. In this paper, we focus on the avaiabe bandwidth as a measure of the reiabiity of a network. We seected FDDI (Fiber Distributed Data Interface) networks for this study. FDDI is an ANSI standard for a 100 Mbits/sec ber optic token ring network [1, 2]. FDDI is suitabe for mission safety critica appications not ony because of its high bandwidth but aso due to its bounded access time and its dua oop architecture. Many new civi and miitary networks are being deveoped based on the skeeton of FDDI. Eampes incude the High-Speed Data Bus and the High-Speed Ring Bus (HSDB/HSRB) [17, 18, 19], the Survivabe Adaptabe Fiber Optic Embedded Network (SAFENET) [4, 9, 11], and Fiber Distributed Data Network (FDDN) [3]. In its basic conguration, an FDDI network consists of two counter-rotating oops. These two uni-directiona ber oops together constitute what is known as the FDDI trunk ring. This architecture provides certain faut toerant properties to FDDI networks. For eampe, most eisting FDDI networks use one oop as primary oop and the other as backup. In the event of a faut on the primary oop, the backup oop is used for transmission. However, this basic conguration may not be abe to toerate two or more fauts. That is, in the worst case two ink fauts wi disconnect the network. To overcome this probem, Raph, Ukrainsky, Scheack, and Weinberg [15] proposed an aternate path FDDI topoogy that uses two FDDI trunk rings. In their network, each station connects to an FDDI concentrator which subsequenty connects itsef to the two trunk rings. By utiizing the buit-in reconguration capabiity in a concentrator it was showed that the network can remain connected in the presence of more than two ink fauts. This soution has signicant practica vaue since it can be impemented using currenty avaiabe FDDI components. However, the avaiabe bandwidth characteristics of such networks during a fauty situation have not been anayzed. Generaizing the idea of aternate path FDDI topoogy, we consider an FDDI-based recongurabe network (FBRN) consisting of n nodes and r FDDI trunk rings. That is, each node is inserted into the r rings. Consequenty, each node has r inks incident on it on the eft and r inks incident on the right. A node has certain reconguration capabiity: a eft ink can be connected to one of m right inks. This is a generaization of the traditiona FDDI network and that proposed in [15]. In a traditiona FDDI network, r = 1 and m = 1 whie for the network considered in [15], r = 2 and m = 2. We are going to study the avaiabe bandwidth of an FBRN given that there are certain number of ink fauts. Ceary, the avaiabe bandwidth depends on not ony the number of FDDI trunk rings (r) but aso the reconguration capabiity of the network. We wi consider three FBRN architectures characterized by their degree of recongurabiity: 1

4 1. Non-Recongurabe Network (N-FBRN): The nodes in these networks have no reconguration capabiity. In other words, m = Fuy Recongurabe Network (F-FBRN): In these networks, a node can recongure the connection of any of its input inks to any of the output inks, i.e., m = r. 3. Partiay Recongurabe Network (P-FBRN): This architecture provides an intermediate degree of recongurabiity, i.e., 0 < m < r. In this paper we wi consider a particuar P-FBRN architecture with m = 2. These network architectures wi be further described in Section 2. In this paper, we wi anayze the avaiabe bandwidth characteristics of the above networks using the foowing measures: 1. The probabiity that the avaiabe bandwidth eceeds a specied vaue for a given number of ink fauts. 2. The epected vaue of avaiabe bandwidth, given the number of ink fauts. These metrics provide a generaization of the traditiona connectivity oriented metrics in the sense that zero avaiabe bandwidth impies that the network is disconnected. As epected, we nd that the fuy recongurabe network has the best avaiabe bandwidth characteristics. However, such a network is dicut to impement. We nd that partiay recongurabe networks, which can be reaized using the eisting commercia products, show a substantia improvement in reiabiity over the non-recongurabe networks. 1.2 Previous work An overview of the reiabiity provisions for the FDDI token ring can be found in [16]. The reiabiity of various network congurations supported by the FDDI standard is discussed in [13]. A comparative anaysis of various station attachment schemes based on the end-to-end user reiabiity and the mean time to faiure metrics is presented in [10]. An automatic faiure isoation and reconguration methodoogy for FDDI is described in [21]. Reiabiity anaysis for dua homing FDDI networks is presented in [12]. The use of two FDDI trunk rings to interconnect stations by concentrators was rst proposed in [15]. Our study etends their scheme to buid a mutipe ring FDDI-based network. In [6], Hies and Marow propose an FDDI concentrator tree topoogy with oopback which can toerate mutipe fauts. For a recent survey on various approaches for improving the reiabiity in FDDI networks, the reader is referred to [5]. 1.3 About this paper This paper is organized as foows. In Section 2, we dene the system mode and discuss three muti-ring architectures with dierent degrees of recongurabiity. Metrics for anayzing the avaiabe bandwidth in a fauty network are dened in Section 3. The performance resuts for these schemes with respect to these metrics are presented. We present our concusions in Section 4. 2

5 2 The network architectures 2.1 Network mode FDDI is a high-speed, ber-optic token ring network. The FDDI trunk ring actuay consists of two uni-directiona counter-rotating ber oops, each capabe of transmitting data at 100 megabits per second. Both the oops within an FDDI trunk ring can be used for data transmission at the same time providing a tota bandwidth of 200 megabits per second. However, most eisting FDDI networks use ony one oop for transmission reserving the other as backup. In the event of a faut on the primary oop, it is possibe to switch to the secondary oop. When a faut at a point of the trunk aects each of the oops, the network can perform a wrap-around, i.e, the primary and the secondary oops are wrapped to isoate the faut. The operation of wrapping resuts in a singe oop having a bandwidth of 100 megabits per second. Thus, the basic FDDI trunk ring provides some buit-in faut toerance capabiities. Note however, that more than one faut on each of the oops wi disconnect the network, dividing it into isoated segments. The need for providing greater bandwidth and increased faut toerance is the motivation for enhancing the basic FDDI topoogy. Both these goas can be achieved by using mutipe trunk rings to connect the individua nodes. Specicay, we use r FDDI trunk rings to interconnect n nodes. Each node has certain reconguration capabiity. Reconguration capabiity of a network comes into pay when the wrap around capabiity can not be used to recover from the fauts. The reconguration capabiity of the nodes makes it possibe to have a trunk segment beong to dierent trunk rings at dierent times. This faciitates isoation of fauty trunk segments in the network and utiization of faut-free segments to provide high avaiabe bandwidth. We ca such muti-ring networks FDDI based recongurabe networks (FBRNs). The detais of reconguration capabiities of FBRNs wi be discussed shorty. In an FBRN, each FDDI trunk ring is treated as one entity at east as far as reconguration is concerned. Reca that an FDDI trunk ring consists of two counter-rotating oops. In this paper, we wi assume that one oop within a trunk ring is used for transmission and the other is reserved as backup. However, our anaysis can be easiy etended for the case when both the oops are used simutaneousy. We denote the trac carrying capacity of a faut-free FDDI trunk ring as one unit. It is convenient to dene some terminoogy for FBRNs. To avoid repetitiousness, we wi use the term ring to mean an FDDI trunk ring. The section of a ring between two neighboring nodes on the network is caed a ink. With n nodes and r rings, there are n r distinct inks in the network. The coection of a the inks between two neighboring nodes wi be caed a bunch. Hence, there are n bunches in the network with each bunch consisting of r inks. 2.2 Faut mode Reiabiity issues in ring networks arise from ikey fauts in individua nodes and the inks connecting the nodes. The objective in designing a reiabe ring network is to maintain the connectivity of nodes in spite of such fauts when they occur. Node fauts in a ring can be handed by removing the fauty node from the ring. FDDI provides an optica bypass mechanism at a node which can be activated to remove that node from the ring. If a node performs some critica functions, then these functions must be dupicated esewhere on the ring so that a faut at that node does not disrupt the network service. Hence, in this study, we disregard node faiures and concentrate on ink fauts. Note that a ink was dened as a segment of an FDDI trunk ring. Hence, it consists of a pair of ber segments beonging to the two counter-rotating oops which constitute the ring. There are two 3

6 kinds of ink fauts: one in which ony one oop is aected and the other where both the oops are aected. The rst kind of ink faut may be handed within the FDDI trunk ring by hopping to the other oop if the other oop is faut-free. An FDDI trunk ring can recover from the second kind of ink faut by wrapping the two oops together on both the sides of the point of faiure. Note that this does not work if there are more than one such ink fauts on a ring. In this case, the reconguration capabiity of the nodes is used to recover from such fauts. In this paper, we concentrate on the second kind of ink fauts. Due to the spatia proimity of the two ber segments constituting a ink, it is ikey that a ink faut may aect both the segments. This is particuary true in a miitary environment where the fauts are a consequence of enemy attacks. We wi assume that a inks have the same probabiity of faiure. We consider a ink to be either in active state or in faied state. A ink in the faied state cannot carry trac. A ink is considered active if it is faut-free. We dene the state of the system as the combination of the states of a the inks in the network. Since there are n r inks, there are in a 2 possibe system states. Further, the number of system states in which there are eacty ink fauts is Reconguration capabiities of FBRNs We assume that initiay, a rings are functiona with each ring contributing one unit of bandwidth. Hence, the network can provide a maimum avaiabe bandwidth of r units when a inks are functiona. The avaiabe bandwidth reduces when some inks fai. The impact of such faiures on the avaiabe bandwidth depends on the abiity of the network to dynamicay recongure itsef in the event of ink fauts. We wi now consider three network architectures with varying degree of recon- gurabiity Three network architectures Two etreme cases of recongurabiity are described rst. Non-Recongurabe Network (N-FBRN). In this case, each ink between two neighboring nodes permanenty beongs to a distinct ring. If a ring has a fauty ink, it stops functioning. Fuy Recongurabe Network (F-FBRN). In this case, there is a switch at each node which makes it possibe to route messages from one trunk ring to another. As a resut, a ink may beong to dierent rings at dierent times depending on the conguration of the switches. The network management entity at each node tries to use as many active inks of a bunch as possibe. The dierence between two networks is iustrated in Figure 1. In this gure ring 3 and ring 4 have two fauty inks as shown. For a non-recongurabe network depicted in Figure 1(a), the avaiabe bandwidth is reduced from origina 4 units to 2 units, since ring 1 and ring 2 are the ony active rings. Further, note that neither ring 3 nor ring 4 can wrap around its two oops as both the rings have two fauts each. However, with fu reconguration capabiity at the nodes, nodes A and C are 1 p q denotes the number of combinations of p objects taken q at a time. 4

7 A A B D B D C (a) C (b) Figure 1: Eampe 1 A A B D B D C (a) C (b) Figure 2: Eampe 2 5

8 can be recongured to merge the segments of rings 3 and 4 as shown in Figure 1(b). Thus, for the same faut pattern, the avaiabe bandwidth is 3 units in an F-FBRN. It is evident that the addition of recongurabiity woud improve the avaiabe bandwidth of the network in the presence of fauts. However, a node in a fuy recongurabe network is compe, particuary when the number of rings is arge. However, in Appendi we wi show how a fuy recongurabe network of 2 trunk rings can be impemented by using eisting FDDI products. Using such smaer recongurabe networks as buiding bocks we can consider a third scheme which provides partia recongurabiity. Partiay Recongurabe Network (P-FBRN). This architecture is a compromise between the high eibiity of the F-FBRN architecture and the ow impementation costs of the N-FBRN architecture. In these networks, the nodes are connected using an even number of rings. The r rings are organized as r distinct ring-pairs. 2 Reconguration is possibe ony between rings within a ring-pair but not across ring-pairs. In other words, the n nodes are interconnected using r F-FBRNs each with two rings. 2 For the faut pattern of Eampe 1 shown in Figure 1, the avaiabe bandwidth of a partiay recongurabe network is the same as that provided by fu recongurabiity. However, Figure 2 iustrates an eampe where fu recongurabiity eads to higher avaiabe bandwidth than partia recongurabiity. In this eampe, a the four rings have ink fauts. With partia recongurabiity, segments of rings 1 and 2 or 3 and 4 may be merged by using the reconguration capabiity of the nodes. Figure 2(a) shows how rings 1 and 2 are merged to savage one unit of bandwidth. Note however that the specic ocation of ink fauts between nodes A and B precudes the merging of rings 3 and 4. Thus, with the partia recongurabiity, ony one unit of bandwidth is avaiabe due to the presence of fauts. However, with fu reconguration capabiity at the nodes, iustrated in Figure 2(b), two units of bandwidth are avaiabe by merging segments of rings 1 and 2 into one ring and those of rings 2 and 3 into another. Nevertheess, the partia reconguration network has the advantage that it can be impemented using eisting FDDI technoogy as discussed in the Appendi. We wi aso see ater that in most cases, the partiay recongurabe network has a much better avaiabe bandwidth characteristics than the non-recongurabe network, whie not being too far behind the fuy recongurabe network Reconguration agorithm for an FBRN Given an FDDI-based recongurabe network (FBRN), once the ink fauts are detected, a reconguration agorithm shoud be eecuted to decide how to recongure the system. The current FDDI standard has specied a faut detection process which is sti appicabe to our FBRNs. Here, we discuss a reconguration agorithm. The N-FBRNs have no provision for reconguration. P-FBRNs are buit using mutipe F-FBRNs with two rings. Hence, we ony need to consider the reconguration agorithm for F-FBRNs. The reconguration agorithm is eecuted at each node after the faut detection process has been eecuted. Hence, a the nodes have a knowedge of the state of the inks incident on them (i.e., fauty or active). Let Left N [i] and Right N [i] denote the inks from ring i incident on node N on its eft and right respectivey. The pseudo code of the agorithm is as foows. 1. For (i = 1; i r; i++) mark Right N [i] unassigned. 6

9 2. for (i = 1; i r; i++) if (Left N [i] is active) then a. connect Left N [i] to Right N [j] for the smaest j such that Right N [j] is active and has not been assigned, and b. mark Right N [j] assigned. 3. wrap together both the oops of unassigned inks. We note that some of the systems (e.g., some eisting FDDI trunk rings) may not have wrap up capabiity. For this kind of system, Step 3 of the above agorithm shoud be skipped. We are now going to derive the avaiabe bandwidth in an F-FBRN using the above reconguration agorithm for both cases of with or without the wrap up step. We need a notation rst. Reca that an FBRN architecture consists of n bunches with r inks per bunch. Let h 1 ; h 2 ; : : :h n?1 ; h n denote the number of fauty inks in a the bunches arranged in a non-decreasing order, i.e., h i h i+1 for i = 1; : : :; n? 1. THEOREM 2.1 The avaiabe bandwidth in an F-FBRN using the above reconguration agorithm is 1. (r? h n ) units if the wrap up option is not used; 2. (r? h n?1 ) units if the wrap up option is used. Due to the space imitation, the proof of the theorem is not presented here. The interested reader is referred to [8] for it. However, the theorem can be intuitivey epained as foows. When the wrap up option is not used, obviousy, the avaiabe bandwidth is at most (r? h n ) units, where h n is the number of damages in the maimay damaged bunch. The above theorem assures that this bandwidth is achieved by the recongurabe agorithm. With the wrap up of oops within a damaged trunk, each ring with ony one ink faut can be restored in step 3 of the above agorithm. It can be shown that the number of such rings is (h n? h n?1 ). Hence the avaiabe bandwidth with wrap up is (r? h n ) + (h n? h n?1 ) units or (r? h n?1 ) units. 3 Anaysis of avaiabe bandwidth In this section, we derive probabiistic characteristics of avaiabe bandwidth for the three network architectures described earier. 3.1 Metrics It is usefu to introduce the foowing notations. = number of fauty (damaged) inks. k = units of bandwidth that are unavaiabe due to ink fauts. s = avaiabe bandwidth. That is, s = r? k: (1) 7

10 Note that for a set of random ink fauts, s is a discrete random variabe. The vaue of s for a network depends on the number of random ink fauts () and their distribution in the network. We wi use f sj () to denote the probabiity mass function of s conditioned on the vaue of. That is, f sj () = Prob(s = j ): (2) a X (n; r; ; k) = tota number of system states with ink fauts such that eacty k units of bandwidth are not avaiabe in a network X. b X (n; r; ; k) = tota number of system states with ink fauts such that at most k units of bandwidth are not avaiabe in a network X. b X (n; r; ; k) and a X (n; r; ; k) are reated as a X (n; r; ; k) = b X (n; r; ; k)? b X (n; r; ; k? 1): (3) The subscript X in the above notations denotes one of the three architectures described in Section 2. We wi use etters N, P and F to correspond to networks N-FBRN, P-FBRN, and F-FBRN respectivey. We consider two metrics for studying the avaiabe bandwidth characteristics of a network: 1. The conditiona probabiity that at east units of bandwidth are avaiabe, given that the number of fauty inks in the network is, denoted A(; ). Formay, A(; ) = rx s= f sj () (4) 2. The epected vaue of avaiabe bandwidth, given that inks in the network are fauty, denoted E[s j ]. From the denition of epectation, E[s j ] is obtained as E[s j ] = rx =1 f sj () (5) As before, a subscript X wi be used to indicate the use of these metrics in the contet of a specic network X. In anayzing the overa reiabiity of a network, an important consideration is whether a nodes can communicate in the presence of network fauts. Whie maintaining connectivity among a nodes is necessary for the nodes to be abe to communicate, it is not sucient to ensure an acceptabe eve of service. The eve of service depends on the trac carrying capacity of the network. The above metrics emphasize this aspect of reiabiity. We now present the anaysis of the three FBRNs with respect to the above metrics. For the purpose of simpicity, we wi start with the case when the wrap up is not used. Etension of our anaysis to the case when the wrap up is used wi be discussed ater. Aso note that the vaues of metrics for the no wrap up case provide ower bounds for the wrap up case. 3.2 Computing A(; ) We wi now derive the rst metric dened earier i.e., the conditiona probabiity that the avaiabe bandwidth is at east given random ink fauts, for the three networks dened in Section 2. We wi rst derive combinatoria quantities a(n; r; ; k) and b(n; r; ; k) for the three networks. Then we use them to estabish the desired resut. 8

11 3.2.1 Non-recongurabe network The foowing emma provides the reevant resut for the N-FBRN i.e., the non-recongurabe mutiring network. LEMMA 3.1 a N (n; r; ; k) is given by a N (n; r; ; k) = r k kx i=0 (?1) i nk? ni k i : (6) Proof: Reca that a oss of k bandwidth units in a non-recongurabe network is caused by eacty r k fauty rings. These k fauty rings can be seected in ways, which is the rst factor in the right k hand side of (6). We now show that the second factor in (6) corresponds to the number of ways in which out of k r inks from k rings can be fauty, such that each of the k rings has at east one fauty ink. Given a particuar set of k rings abeed 1 k, et B i denote the set of system states in which at east one ink from ring i is fauty. Thus S k i=1 B i denotes the set of system states where a the ink fauts beong to the specic k rings. Since there are ink fauts, the size of this set is foowing discussion, we wi consider S k i=1 B i as the universa set. nk. In the Our interest is in nding the size of the set T k i=1 B i. Using the resuts from set theory, this can be obtained as foows. n( k\ i=1 B i ) = n([ k i=1 B i)? n(\ k i=1 B i) = = = = nk nk nk kx i=0? n([ k i=1 B i)? f? ( X 1ik k 1 (?1) i nk? ni n(b i )? nk? n X 1i<jk n(b i \ B j ) + X 1i<j<mk n(b i \ B j \ B m )? : : : g? k nk? 2n + k nk? 3n? : : : 2 3 k i : (7) This estabishes the desired resut Fuy recongurabe network It is dicut to obtain a cosed form soution for this network for arbitrary vaues of n and r. However, we can obtain a recurrence reation for b(n; r; ; k) as stated in the foowing emma. ) 9

12 LEMMA 3.2 b F (n; r; ; k) satises the foowing reation: b F (n; r; ; k) = 8 >< >: 0 > n k, P kj=0 b F (n? 1; r;? j; k) r j < k, k n k and n > 2: (8) For the base case of n = 2, we have b F (2; r; ; k) = kx j=ma(0;?k) r j r? j : (9) Proof: The rst boundary condition is easiy estabished using the pigeonhoe principe. If > n k, at east one of the n bunches must have more than k fauty inks. The second boundary condition foows from the fact that with < k we cannot have a bunch with more than k fauty inks. To derive the recurrence reation, consider the set of a system states with ink fauts which resut in a oss of at most k bandwidth units in an F-FBRN. This set can be partitioned into mutuay ecusive subsets based on the number of ink fauts from a particuar bunch. If this bunch has eacty j ink fauts r (which coud happen in ways), then the remaining? j fauts must be distributed in an identica j fuy recongurabe network with n? 1 nodes aowing for at most k units of oss in bandwidth. The base case for the recurrence is for a network with ony two nodes, i.e., n = 2. The epression for this case is obtained by noting that the system state is dened by the j fauty inks from one bunch and the corresponding? j fauty inks in the other. Note that neither j nor? j can eceed k. 2 The specia case of r = 2, is more amenabe to anaysis as seen from the foowing resut. LEMMA 3.3 a F (n; 2; ; k) for > 0 is obtained as foows a F (n; 2; ; k) = 8 >< >: 0 k = 0 or k > 2, n 2 k = 1, 2n? n 2 k = 2. (10) Proof: It is obvious that > 0 impies that the avaiabe bandwidth must reduce at east by one and hence a F (n; 2; ; 0) = 0. The case of k > 2 is trivia since there are ony two rings. To nd the number of system states which ead to oss of eacty one bandwidth unit, we observe that such states cannot have a bunch with both of its inks fauty. Since there are fauty inks, there must be n eacty bunches with one ink fauty in each of them. These bunches can be seected in ways and corresponding to each such seection, there are 2 ways of picking up the damaged inks in these 10

13 bunches. Hence, there are n 2 distinct system states corresponding to a F (n; 2; ; 1). Since, for non-zero, either one or two bandwidth units may be ost, and since ways in which out of the 2n inks may be fauty, a F (n; 2; ; 2) is obtained as 2 We wi nd this emma usefu in anayzing the partiay recongurabe network Partiay recongurabe network 2n is the tota number of The foowing resut estabishes a recurrence reation to compute a(n; r; ; k) for P-FBRN. 2n? a F (n; 2; ; 1). LEMMA 3.4 a P (n; r; ; k) satises the foowing recurrence reation X n a P (n; r; ; k) = a P (n; r? 2; ; k) + a P (n; r? 2;? j; k? 1) 2 j j j=1 ( ) X 2n + a P (n; r? 2;? j; k? 2)? 2 n j : (11) j j j=2 Proof: Reca that the partiay recongurabe network of r rings is composed of r pairs of rings with 2 each pair being a fuy recongurabe network. However, there is no switching from a ring from one pair to that from another. Consider the set of a system states in which inks are fauty and eacty k units of bandwidth are ost in case of P-FBRN. This set can be partitioned into three casses based on the status of one specic pair: 1. No ink fauts in this pair of rings. 2. Some ink fauts in this pair with eacty one unit of bandwidth ost. 3. Some ink fauts in this pair with eacty both units of bandwidth ost. In the rst case, the probem reduces to seecting fauty inks in a simiar network with one ess pair of rings and eacty k units of oss in bandwidth. The second and the third case simiary reduce to smaer equivaent probems. In these cases, we rst consider j(j > 0) ink fauts in this pair and use the resuts of emma 3.3 for mutipicative factors. Summing over a possibe vaues of j gives the desired resut Theorem for computing A X (; ) Given that we have obtained either a(n; r; ; k) or b(n; r; ; k) for each of the networks, we now can estabish the foowing theorem that uses the vaues of either of these combinatoria quantities to compute A(; ). 11

14 THEOREM 3.1 A X (; ) for any network X is given by A X (; ) = = r? X k=0 r? X k=0 a X (n; r; ; k) b X (n; r; ; k)? b X (n; r; ; k? 1) : (12) Proof: Let U X (n; r; ; k) denote the probabiity that eacty k bandwidth units are unavaiabe for a particuar network X, given that inks have faied. Hence A X (; ), the conditiona probabiity that the avaiabe bandwidth for network X is at east can be obtained in terms of U X (n; r; ; k) as A X (; ) = r? X k=0 U X (n; r; ; k): (13) Since there are n r inks in the network, is the tota number of congurations in which distinct inks may be fauty. Hence, the conditiona probabiity that eacty k units of bandwidth are unavaiabe is or equivaenty U X (n; r; ; k) = a X(n; r; ; k) ; (14) U X (n; r; ; k) = b X(n; r; ; k)? b X (n; r; ; k? 1) (15) where a X (n; r; ; k) and b X (n; r; ; k) are dened in Section Thus, A X (; ) for the three networks discussed in Section 2 can be computed using (12) in conjunction with the resuts of the emmas of this section Numerica resuts The numerica resuts for A(; ) for some network parameters are potted in Figure 3. The network is assumed to have 20 nodes with 6 rings (i.e., n = 20 and r = 6). From this gure, it is evident that the partiay recongurabe network has a signicanty better reiabiity than the non-congurabe network if the avaiabiity of 3 or more units of bandwidth is critica for the network. As seen from Figure 3, a faiure of 10 inks (which constitutes approimatey 8% of the tota of 120 inks in the network) impies that the probabiity that at east two units of bandwidth are avaiabe is very ow for the non-recongurabe network. For the same conditions, the partiay recongurabe network has a much better performance. Simiar observations can be made from Figure 4. However, as seen from Figure 5, a more stringent requirement such as a high probabiity of having 4 out of 6 units avaiabe can be satisfactoriy met ony using a fuy recongurabe network. 12

15 1.00 A(2,) N-FBRN P-FBRN F-FBRN Figure 3: A(2, ) for dierent networks 0.80 A(3,) N-FBRN P-FBRN F-FBRN Figure 4: A(3, ) for dierent networks 13

16 A(4,) N-FBRN P-FBRN F-FBRN Figure 5: A(4, ) for dierent networks 3.3 Computing E[s j ] The epected vaue of avaiabe bandwidth s, when r random ink fauts occur, can be obtained as E[s j ] = = = = rx s=1 rx k=0 rx k=0 rx k=0 s f sj (s) (16) (r? k) U(n; r; ; k) (17) a(n; r; ; k) (r? k) (18) b(n; r; ; k)? b(n; r; ; k? 1) (r? k) (19) However, a dierent approach towards computing the mean avaiabe bandwidth eads to simper epressions. The foowing theorems provide the resuts for various network architectures of interest Non-recongurabe network THEOREM 3.2 For the non-recongurabe network, the epected vaue of the avaiabe bandwidth, 14

17 given that there have been random ink fauts, is given as foows: E N [s j ] = r? n : (20) Proof: Consider the r rings to be abeed from 1 to r. Let s i denote a discrete random variabe dened as ( 1 if ring i has no fauty inks s i = (21) 0 otherwise. Hence the avaiabe bandwidth s is obtained as s = rx i=1 Note that a s i 's are identicay distributed. Hence, E[s j ] = rx i=1 s i : (22) E[s i j ] = r E[s i j ]: (23) From the denition of s i, it foows that E[s i j ] is same as Prob(s i = 1 j ink fauts). This probabiity is easiy seen to be? n. Hence we obtain the resut (20) Fuy recongurabe network The genera case for this network is dicut to anayze. Numerica vaues of the mean avaiabe bandwidth can be obtained using (16). However, we have the foowing usefu resut for the specia case when r = 2. THEOREM 3.3 For the fuy recongurabe network with r = 2, the epected vaue of the avaiabe bandwidth, given that there have been random ink fauts, is E F [s j ] = 8 >< >: n 2n 2 > 0, 2 = 0 : 2 Equating the epression for the mean avaiabe bandwidth given by (20) with that obtained using (16) and the resuts of emma 3.1 gives us the foowing interesting combinatoria identity rx r?s? X n r r = s (?1) i? ns? ni s s=0 i=0 As yet, we do not know of any other proof for this identity. r? s i : (24) 15

18 N-FBRN P-FBRN F-FBRN E[s ] Figure 6: Mean Avaiabe Bandwidth Proof: The case of = 0 is trivia. For > 0, the resut foows by direct appication of (16) with the probabiities obtained using (14) and by emma Partiay recongurabe network THEOREM 3.4 For the partiay recongurabe network, the epected vaue of the avaiabe bandwidth, given that there have been random ink fauts, is E P [s j ] = r 2 P q=1 n q? 2n 2 q? q + r? 2n : (25) Proof: This resut can be proved using simiar reasoning as in Theorem 3.2 with s i being dened for the ith pair of rings (i.e, rings 2i? 1 and 2i) Numerica resuts The performance of the three networks based on the mean avaiabe bandwidth is shown in Figure 6. These gures are based on the same network parameters as before, i.e., n = 20, r = 6. The foowing observations can be made from Figure 6: 16

19 For a three network architectures, the mean avaiabe bandwidth decreases with increase in the number of fauty inks () as epected. For a sma vaue of, a three systems have comparabe performance. The abiity of a network to recongure itsef is tested ony when the number of ink fauts is sucienty high. On the other hand, a very arge vaue of means a heavy damage to the network and a the reconguration schemes tend to have a ow avaiabe bandwidth as is increased beyond a certain vaue. As epected, the mean avaiabe bandwidth for the fuy recongurabe system is the highest whie that for the non-recongurabe system is the owest. However, the partiay recongurabe system which is much easier to impement than the fuy recongurabe system has a very good performance. It is seen that partiay recongurabiity provides a signicant improvement over the non-recongurabe mutipe ring architecture. For eampe, when = 20, i.e., when 16:67% of the inks are fauty, the N-FBRN has an amost zero mean avaiabe bandwidth. On the other hand, for the same conditions, the mean avaiabe bandwidths of P-FBRN and F-FBRN are cose to 2 units and 3 units respectivey. 3.4 Taking wrap-around into account The anaysis presented so far did not consider the possibiity of wrapping around the two counterrotating oops of a trunk to recover from a singe point trunk faut. Etension of our anaysis to take this possibiity into account is possibe, athough the corresponding derivations become tedious. The genera approach is to consider the number of rings with singe faut separatey. The simpest case is that of deriving the mean avaiabe bandwidth for the non-recongurabe network i.e., E N [s j ]. To take wrap around in account, in Theorem 3.2, we change the denition of s i, the bandwidth contributed by ring i so that s i = 1 if ring i has 0 or 1 fauty inks. From straight forward combinatoria arguments, the probabiity of s i being 1 can then be obtained as Prob(s i = 1 j ink fauts) =? n Mutipying this probabiity by r gives the mean avaiabe bandwidth. + n? n? 1 : (26) For the genera case of fuy recongurabe networks, Theorem 2.1 indicates that consideration of wrap around impies that the mean avaiabe bandwidth is r? E[h n?1 j ], where h n?1 denotes the second argest number of inks damaged in a bunch. Reca that the sequence h 1 ; h 2 ; : : :h n denotes the number of inks damaged in the n bunches sorted in non-decreasing order. h n?1 is the second order statistic. An approach woud be to derive the distribution or the epectation of order statistics for these random variabes. For a more detaied discussion on these issues, see [8]. 4 Concusions In this paper we proposed the use of mutipe FDDI rings with recongurabe architecture. Our objective is to provide a signicant improvement over the standard FDDI networks in terms of connectivity and avaiabe bandwidth. We studied three FDDI based recongurabe networks varying in the degree of recongurabiity supported by the network nodes. We derived the probabiity of the avaiabe bandwidth eceeding a certain given vaue and the mean vaue of avaiabe bandwidth for 17

20 a given number of ink fauts. One of the important observations is that a partiay recongurabe network architecture provided a much better performance than a non-recongurabe network. The partiay recongurabe network is particuary attractive because it can be reaized using commerciay avaiabe FDDI products. The work done here can be etended in severa interesting ways. For eampe, dierent partia recongurabe networks other than the one discussed here can be investigated for their reaizabiity using currenty avaiabe FDDI products. Currenty we are working on the design and anaysis of a concentrator which can connect four FDDI trunk rings. Use of such a concentrator in a P-FBRN woud certainy resut in better performance than the one we considered in this paper. References [1] FDDI Token ring media access contro (MAC). ANSI Standard X3.139, [2] ANSI Standard X3T9.5, Fiber Distributed Data Interface (FDDI) - Token Ring Medium Access Contro (MAC) May, [3] M. D. Cohn, \A network architecture for advanced aircraft", Proc. IEEE Conf. on Loca Computer Networks, pp , Minneapois MN, Oct , [4] D. T. Green and D. T. Marow, \SAFENET { A LAN for navy mission critica systems", Proc. of 14th Conf. on Loca Computer Networks, [5] W. Hies, and D. Marow, \Approaches for survivabiity in FDDI networks", Proc. of 17th Conf. on Loca Computer Networks, [6] W. Hies, and D. Marow, \Eperimentation on the concentrator tree with oopback", Proc. of 18th Conf. on Loca Computer Networks, [7] M. J. Johnson, \Reiabiity mechanisms of the FDDI high bandwidth token ring protoco", Computer Networks ISDN Systems, Vo. II., No. 2, pp , [8] S. Kamat, \Performance issues in high-speed rea-time networks", PhD Thesis, under preparation. [9] R. J. Kochanski and J. L. Paige, \SAFENET { The standard and its appication", IEEE LCS, Vo. 2, No. 1., pp , Feb [10] D. Logothetis and K. Trivedi, \Reiabiity anaysis of various station attachment schemes in a FDDI token ring", [11] U.S. Department of Defense. \Survivabe Adaptabe Fiber Optic Embedded Network ", Sept MIL-STD-2204 [12] G. Nguyen, \Reiabiity anaysis for FDDI dua homing networks", Proc. of 18th Conf. on Loca Computer Networks, [13] K. B. Ochetree, \Using redundancy in FDDI networks," Proc. IEEE Conf. on Loca Computer Networks, pp , [14] Lt. J. L. Paige, \SAFENET - A navy approach to computer networking", Proc. IEEE Conf. on Loca Computer Networks, pp , Minneapois MN, Sept Oct. 3, [15] S. Raph, O. Ukrainsky, R. Scheack, and L. Weinberg, \Aternate path FDDI topoogy ", Proc. IEEE Conf. on Loca Computer Networks, pp , Sept [16] F. E. Ross, \An overview of FDDI: The Fiber Distributed Data Interface", IEEE Journa on Se. Areas in Comm., Vo. 7, Sept [17] SAE, Aerospace Systems Division, Committee AS-2, \Linear Token-passing Mutipe Data Bus", AS4074.1, Version 4.0, [18] SAE, Aerospace Systems Division, Committee AS-2, \High Speed Ring Bus (HSRB)", AS4074.2, Jan. 27, [19] R. W. Uhhorn, \The Fiber-Optic High-Speed Data Bus for a new generation of miitary aircraft", IEEE LCS, Vo. 2, No. 1, Feb [20] R. Wikov, \Anaysis and design of reiabe computer networks", IEEE Transactions on Communications, Vo. COM-20, pp , June

21 [21] Y. Y. Yang and R. Sankar, \Automatic faiure isoation and reconguration", IEEE Network, Vo. 7, No. 5, pp , Sept

Distribution of Path Durations in Mobile Ad-Hoc Networks and Path Selection

Distribution of Path Durations in Mobile Ad-Hoc Networks and Path Selection Distribution of ath Durations in Mobie Ad-Hoc Networks and ath Seection Richard J. La and Yijie Han Abstract We investigate the issue of path seection in mutihop wireess networks with the goa of identifying

More information

Availability Analysis for Elastic Optical Networks with Multi-path Virtual Concatenation Technique

Availability Analysis for Elastic Optical Networks with Multi-path Virtual Concatenation Technique Progress In Eectromagnetics Research Symposium Proceedings, Guangzhou, China, Aug. 25 28, 2014 849 Avaiabiity Anaysis for Eastic Optica Networks with Muti-path Virtua Concatenation Technique Xiaoing Wang

More information

AN Ω(D log(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS

AN Ω(D log(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS SIAM J. COMPUT. c 1998 Society for Industria and Appied Mathematics Vo. 27, No. 3, pp. 702 712, June 1998 008 AN Ω(D og(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS EYAL KUSHILEVITZ AND YISHAY MANSOUR

More information

OpenStax-CNX module: m Inductance. OpenStax College. Abstract

OpenStax-CNX module: m Inductance. OpenStax College. Abstract OpenStax-CNX modue: m42420 1 Inductance OpenStax Coege This work is produced by OpenStax-CNX and icensed under the Creative Commons Attribution License 3.0 Cacuate the inductance of an inductor. Cacuate

More information

Joint Optimization of Scheduling and Power Control in Wireless Networks: Multi-Dimensional Modeling and Decomposition

Joint Optimization of Scheduling and Power Control in Wireless Networks: Multi-Dimensional Modeling and Decomposition This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Citation information: DOI 10.1109/TMC.2018.2861859,

More information

GRAY CODE FOR GENERATING TREE OF PERMUTATION WITH THREE CYCLES

GRAY CODE FOR GENERATING TREE OF PERMUTATION WITH THREE CYCLES VO. 10, NO. 18, OCTOBER 2015 ISSN 1819-6608 GRAY CODE FOR GENERATING TREE OF PERMUTATION WITH THREE CYCES Henny Widowati 1, Suistyo Puspitodjati 2 and Djati Kerami 1 Department of System Information, Facuty

More information

Rateless Codes for the Gaussian Multiple Access Channel

Rateless Codes for the Gaussian Multiple Access Channel Rateess Codes for the Gaussian Mutipe Access Channe Urs Niesen Emai: uniesen@mitedu Uri Erez Dept EE, Te Aviv University Te Aviv, Israe Emai: uri@engtauaci Devavrat Shah Emai: devavrat@mitedu Gregory W

More information

Performance Measures of a UWB Multiple-Access System: DS/CDMA versus TH/PPM

Performance Measures of a UWB Multiple-Access System: DS/CDMA versus TH/PPM Performance Measures of a UWB Mutipe-Access System: DS/CDMA versus TH/PPM Aravind Kaias and John A. Gubner Dept. of Eectrica Engineering University of Wisconsin-Madison Madison, WI 53706 akaias@wisc.edu,

More information

NEW RISK ANALYSIS METHOD to EVALUATE BCP of SUPPLY CHAIN DEPENDENT ENTERPRISE

NEW RISK ANALYSIS METHOD to EVALUATE BCP of SUPPLY CHAIN DEPENDENT ENTERPRISE The 14 th Word Conference on Earthquake Engineering NEW RISK ANALYSIS ETHOD to EVALUATE BCP of SUPPLY CHAIN DEPENDENT ENTERPRISE Satoru Nishikawa 1, Sei ichiro Fukushima 2 and Harumi Yashiro 3 ABSTRACT

More information

Joint Spectrum Access and Pricing in Cognitive Radio Networks with Elastic Traffic

Joint Spectrum Access and Pricing in Cognitive Radio Networks with Elastic Traffic Joint Spectrum Access and Pricing in Cognitive Radio Networks with Eastic Traffic Joceyne Eias University of Bergamo E-mai: joceyne.eias@unibg.it Fabio Martignon University of Bergamo E-mai: fabio.martignon@unibg.it

More information

An Evaluation of Connectivity in Mobile Wireless Ad Hoc Networks

An Evaluation of Connectivity in Mobile Wireless Ad Hoc Networks An Evauation of Connectivity in Mobie Wireess Ad Hoc Networks Paoo Santi Istituto di Informatica e Teematica Area dea Ricerca de CNR Via G.Moruzzi, 5624 Pisa Itay santi@iit.cnr.it Dougas M. Bough Schoo

More information

Radial basis function networks for fast contingency ranking

Radial basis function networks for fast contingency ranking Eectrica Power and Energy Systems 24 2002) 387±395 www.esevier.com/ocate/ijepes Radia basis function networks for fast contingency ranking D. Devaraj a, *, B. Yegnanarayana b, K. Ramar a a Department of

More information

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks roceedings of the 46th IEEE Conference on Decision and Contro New Oreans, LA, USA, Dec. 12-14, 27 FrB2.5 ower Contro and Transmission Scheduing for Network Utiity Maximization in Wireess Networks Min Cao,

More information

Joint Optimal Power Allocation and Relay Selection with Spatial Diversity in Wireless Relay Networks

Joint Optimal Power Allocation and Relay Selection with Spatial Diversity in Wireless Relay Networks Proceedings of SDR'11-WInnComm-Europe, 22-24 Jun 2011 Joint Optima Power Aocation and Reay Seection with Spatia Diversity in Wireess Reay Networks Md Habibu Isam 1, Zbigniew Dziong 1, Kazem Sohraby 2,

More information

Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks

Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Energy-Aware Scheduing with Quaity of Surveiance Guarantee in Wireess Sensor Networks Jaehoon Jeong, Sarah Sharafkandi, and David H.C. Du Dept. of Computer Science and Engineering, University of Minnesota

More information

Utility-Proportional Fairness in Wireless Networks

Utility-Proportional Fairness in Wireless Networks IEEE rd Internationa Symposium on Persona, Indoor and Mobie Radio Communications - (PIMRC) Utiity-Proportiona Fairness in Wireess Networks G. Tychogiorgos, A. Gkeias and K. K. Leung Eectrica and Eectronic

More information

Wireless Communications

Wireless Communications Wireess Communications Ceuar Concept Hamid Bahrami Reference: Rappaport Chap3 Eectrica & Computer Engineering Statements of Probems Soving the probem of Spectra congestion System Capacity A system-eve

More information

CO-ORDINATE POSITION OF SENSOR IN MASS OF CUTTING TOOL

CO-ORDINATE POSITION OF SENSOR IN MASS OF CUTTING TOOL XIV Internationa PhD Worshop OWD 00 3 October 0 CO-ORDINATE POSITION OF SENSOR IN MASS OF CUTTING TOOL G. Tymchi I. Diorditsa S. Murahovsyy R. Tymchi Nationa Technica University of Uraine "Kiev Poytechnic

More information

A Low Complexity VCS Method for PAPR Reduction in Multicarrier Code Division Multiple Access

A Low Complexity VCS Method for PAPR Reduction in Multicarrier Code Division Multiple Access 0 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA, VOL. 5, NO., JUNE 007 A Low Compexity VCS Method for PAPR Reduction in Muticarrier Code Division Mutipe Access Si-Si Liu, Yue iao, Qing-Song Wen,

More information

Optimum Fault Current Limiter Placement

Optimum Fault Current Limiter Placement Optimum aut urrent Limiter acement Jen-Hao Teng han-an Lu Abstract: Due to the difficuty in power network reinforcement and the interconnection of more distributed generations, faut current eve has become

More information

ADAPTIVE ITERATION SCHEME OF TURBO CODE USING HYSTERESIS CONTROL

ADAPTIVE ITERATION SCHEME OF TURBO CODE USING HYSTERESIS CONTROL ADATIV ITRATION SCHM OF TURBO COD USING HYSTRSIS CONTROL Chih-Hao WU, Kenichi ITO, Yung-Liang HUANG, Takuro SATO Received October 9, 4 Turbo code, because of its remarkabe coding performance, wi be popuar

More information

Improving the Active Power Filter Performance with a Prediction Based Reference Generation

Improving the Active Power Filter Performance with a Prediction Based Reference Generation Improving the Active Power Fiter Performance with a Prediction Based Reference Generation M. Routimo, M. Sao and H. Tuusa Abstract In this paper a current reference generation method for a votage source

More information

Development of a LabVIEW-based test facility for standalone PV systems

Development of a LabVIEW-based test facility for standalone PV systems Deveopment of a LabVIEW-based test faciity for standaone PV systems Aex See Kok Bin, Shen Weixiang, Ong Kok Seng, Saravanan Ramanathan and Low I-Wern Monash University Maaysia, Schoo of Engineering No.2,

More information

Fuzzy Logic System for Opportunistic Spectrum Access using Cognitive Radio

Fuzzy Logic System for Opportunistic Spectrum Access using Cognitive Radio IJCSI Internationa Journa of Computer Science Issues, Vo. 10, Issue 1, No 1, January 2013 ISSN (Print): 1694-0784 ISSN (Onine): 1694-0814 www.ijcsi.org 703 uzzy Logic System for Opportunistic Spectrum

More information

Resource Allocation via Linear Programming for Multi-Source, Multi-Relay Wireless Networks

Resource Allocation via Linear Programming for Multi-Source, Multi-Relay Wireless Networks Resource Aocation via Linear Programming for Muti-Source, Muti-Reay Wireess Networs Nariman Farsad and Andrew W Ecford Dept of Computer Science and Engineering, Yor University 4700 Keee Street, Toronto,

More information

Rate-Allocation Strategies for Closed-Loop MIMO-OFDM

Rate-Allocation Strategies for Closed-Loop MIMO-OFDM Rate-Aocation Strategies for Cosed-Loop MIMO-OFDM Joon Hyun Sung and John R. Barry Schoo of Eectrica and Computer Engineering Georgia Institute of Technoogy, Atanta, Georgia 30332 0250, USA Emai: {jhsung,barry}@ece.gatech.edu

More information

Understanding The HA2500 Horizontal Output Load Test

Understanding The HA2500 Horizontal Output Load Test Understanding The HA2500 Horizonta Output Load Test Horizonta output stages are part of every CRT video dispay incuding cosed circuit monitors, computer monitors, video games, medica monitors, TVs. HDTVs,

More information

Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits

Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits Secure Physica Layer Key Generation Schemes: Performance and Information Theoretic Limits Jon Waace Schoo of Engineering and Science Jacobs University Bremen, Campus Ring, 879 Bremen, Germany Phone: +9

More information

Cooperative Caching in Dynamic Shared Spectrum Networks

Cooperative Caching in Dynamic Shared Spectrum Networks Fina version appears in IEEE Trans. on Wireess Communications, 206. Cooperative Caching in Dynamic Shared Spectrum Networs Dibaar Das, Student Member, IEEE, and Ahussein A. Abouzeid, Senior Member, IEEE

More information

Run to Potential: Sweep Coverage in Wireless Sensor Networks

Run to Potential: Sweep Coverage in Wireless Sensor Networks Run to Potentia: Sweep Coverage in Wireess Sensor Networks Min Xi,KuiWu,Yong Qi,Jizhong Zhao, Yunhao Liu,MoLi Department of Computer Science, Xi an Jiaotong University, China Department of Computer Science,

More information

Coordination Improvement of Directional Overcurrent Relays in a Microgrid Using Modified Particle Swarm Optimization Algorithm

Coordination Improvement of Directional Overcurrent Relays in a Microgrid Using Modified Particle Swarm Optimization Algorithm Internationa Journa of Eectrica Components and Energy Conversion 2018; 4(1): 21-32 http://www.sciencepubishinggroup.com/j/ijecec doi: 10.11648/j.ijecec.20180401.13 ISSN: 2469-8040 (Print); ISSN: 2469-8059

More information

DESIGN OF A DIPOLE ANTENNA USING COMPUTER SIMULATION

DESIGN OF A DIPOLE ANTENNA USING COMPUTER SIMULATION Undergraduate Research Opportunity Project (UROP ) DESIGN OF A DIPOLE ANTENNA USING COMPUTER SIMULATION Student: Nguyen, Tran Thanh Binh Schoo of Eectrica & Eectronic Engineering Nayang Technoogica University

More information

Satellite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic

Satellite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic Sateite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic Jing Zhu and Sumit Roy Department of Eectrica Engineering, University of Washington Box 352500, Seatte, WA 98195, USA

More information

Pulsed RF Signals & Frequency Hoppers Using Real Time Spectrum Analysis

Pulsed RF Signals & Frequency Hoppers Using Real Time Spectrum Analysis Pused RF Signas & Frequency Hoppers Using Rea Time Spectrum Anaysis 1 James Berry Rohde & Schwarz Pused Rea Time and Anaysis Frequency Seminar Hopper Agenda Pused Signas & Frequency Hoppers Characteristics

More information

Model of Neuro-Fuzzy Prediction of Confirmation Timeout in a Mobile Ad Hoc Network

Model of Neuro-Fuzzy Prediction of Confirmation Timeout in a Mobile Ad Hoc Network Mode of Neuro-Fuzzy Prediction of Confirmation Timeout in a Mobie Ad Hoc Network Igor Konstantinov, Kostiantyn Poshchykov, Sergej Lazarev, and Oha Poshchykova Begorod State University, Pobeda Street 85,

More information

Minimizing Distribution Cost of Distributed Neural Networks in Wireless Sensor Networks

Minimizing Distribution Cost of Distributed Neural Networks in Wireless Sensor Networks 1 Minimizing Distribution Cost of Distributed Neura Networks in Wireess Sensor Networks Peng Guan and Xiaoin Li Scaabe Software Systems Laboratory, Department of Computer Science Okahoma State University,

More information

Distributed Resource Allocation for Relay-Aided Device-to-Device Communication Under Channel Uncertainties: A Stable Matching Approach

Distributed Resource Allocation for Relay-Aided Device-to-Device Communication Under Channel Uncertainties: A Stable Matching Approach Distributed Resource Aocation for Reay-Aided Device-to-Device Communication Under Channe Uncertainties: A Stabe Matching Approach Monowar Hasan, Student Member, IEEE, and Ekram Hossain, Feow, IEEE Abstract

More information

Worst case delay analysis for a wireless point-to-point transmission

Worst case delay analysis for a wireless point-to-point transmission Worst case deay anaysis for a wireess point-to-point transmission Katia Jaffrès-Runser University of Tououse IRIT - INPT ENSEEIHT Tououse, France Emai: katia.jaffres-runser@irit.fr Abstract Wireess technoogies

More information

Capacity of Data Collection in Arbitrary Wireless Sensor Networks

Capacity of Data Collection in Arbitrary Wireless Sensor Networks This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. 1 Capacity of Data Coection in Arbitrary Wireess

More information

arxiv: v1 [cs.it] 22 Aug 2007

arxiv: v1 [cs.it] 22 Aug 2007 Voice Service Support in Mobie Ad Hoc Networks Hai Jiang, Ping Wang, H. Vincent Poor, and Weihua Zhuang Dept. of Eec. & Comp. Eng., University of Aberta, Canada, hai.jiang@ece.uaberta.ca Dept. of Eec.

More information

Power Spectrum Optimization for Interference Mitigation via Iterative Function Evaluation

Power Spectrum Optimization for Interference Mitigation via Iterative Function Evaluation Power Spectrum Optimization for Interference Mitigation via Iterative Function Evauation Hayssam Dahrouj, Wei Yu, Taiwen Tang, and Steve Beaudin Eectrica and Computer Engineering Dept., University of Toronto,

More information

an ampier and a transmitter. P sat is the interna saturation power of the optica ampier. G max is the maximum sma-signa gain of the optica ampier. The

an ampier and a transmitter. P sat is the interna saturation power of the optica ampier. G max is the maximum sma-signa gain of the optica ampier. The Optimizing Ampier Pacements in a Muti-Waveength Optica LAN/MAN: The Unequay-Powered-Waveengths Case Byrav Ramamurthy, Jason Iness, and Biswanath Mukherjee Abstract Optica networks based on passive-star

More information

CAN FD system design

CAN FD system design icc 215 CAN FD system design Dr. - Ing. M. Schreiner Daimer Research and Deveopment Abstract The objective of this paper is to give genera design rues for the physica ayer of CAN FD networks. As an introduction

More information

THE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN

THE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN THE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN A CDMA SYSTEM Yan Zhang, Laurence B. Mistein, and Pau H. Siege Department of ECE, University of Caifornia, San Diego

More information

Fast Hybrid DFT/DCT Architecture for OFDM in Cognitive Radio System

Fast Hybrid DFT/DCT Architecture for OFDM in Cognitive Radio System Fast Hybrid DF/D Architecture for OFDM in ognitive Radio System Zhu hen, Moon Ho Lee, Senior Member, EEE, hang Joo Kim 3 nstitute of nformation&ommunication, honbuk ationa University, Jeonju, 56-756,Korea

More information

Iterative Transceiver Design for Opportunistic Interference Alignment in MIMO Interfering Multiple-Access Channels

Iterative Transceiver Design for Opportunistic Interference Alignment in MIMO Interfering Multiple-Access Channels Journa of Communications Vo. 0 No. February 0 Iterative Transceiver Design for Opportunistic Interference Aignment in MIMO Interfering Mutipe-Access Channes Weipeng Jiang ai Niu and Zhiqiang e Schoo of

More information

FAULT-TOLERANT AND REAL-TIME WIRELESS SENSOR NETWORK FOR CONTROL SYSTEM

FAULT-TOLERANT AND REAL-TIME WIRELESS SENSOR NETWORK FOR CONTROL SYSTEM FAULT-TOLERANT AND REAL-TIME WIRELESS SENSOR NETWORK FOR CONTROL SYSTEM by Wenchen Wang Bacheor of Engineering, Northeastern University, China 2013 M.S. in Computer Science, University of Pittsburgh, 2017

More information

P H O T O CD I N F O R M A T I O N B U L L E T I N

P H O T O CD I N F O R M A T I O N B U L L E T I N PCD 077 Juy, 1994 Copyright, Eastman Kodak Company, 1994 P H O T O CD I N F O R M A T I O N B U L L E T I N Fuy Utiizing Photo CD Images Maintaining Coor Consistency When Creating KODAK Photo CD Portfoio

More information

Performance Comparison of Cyclo-stationary Detectors with Matched Filter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 2

Performance Comparison of Cyclo-stationary Detectors with Matched Filter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 2 ISSN 319-8885 Vo.3,Issue.39 November-14, Pages:7859-7863 www.ijsetr.com Performance Comparison of Cyco-stationary Detectors with Matched Fiter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 1 PG Schoar,

More information

arxiv: v4 [physics.soc-ph] 31 Dec 2013

arxiv: v4 [physics.soc-ph] 31 Dec 2013 A Cascading Faiure Mode by Quantifying Interactions Junjian Qi and Shengwei Mei Department of Eectrica Engineering, Tsinghua University, Beijing, China 100084 arxiv:1301.2055v4 [physics.soc-ph] 31 Dec

More information

Dealing with Link Blockage in mmwave Networks: D2D Relaying or Multi-beam Reflection?

Dealing with Link Blockage in mmwave Networks: D2D Relaying or Multi-beam Reflection? Deaing with Lin Bocage in mmwave etwors: DD Reaying or Muti-beam Refection? Mingjie Feng, Shiwen Mao Dept. Eectrica & Computer Engineering Auburn University, Auburn, AL 36849-5, U.S.A. Tao Jiang Schoo

More information

BER Performance Analysis of Cognitive Radio Physical Layer over Rayleigh fading Channel

BER Performance Analysis of Cognitive Radio Physical Layer over Rayleigh fading Channel Internationa Journa of Computer ppications (0975 8887) Voume 5 No.11, Juy 011 BER Performance naysis of Cognitive Radio Physica Layer over Rayeigh fading mandeep Kaur Virk Dr. B R mbedkar Nationa Institute

More information

l ARRANGE A SECOND PLURALITY OF Z-A STAGES TO PROVIDE A SECOND ADC CHANNEL m

l ARRANGE A SECOND PLURALITY OF Z-A STAGES TO PROVIDE A SECOND ADC CHANNEL m USOO8922411B2 (12) United States Patent (10) Patent No.: Umann et a. (45) Date of Patent: Dec. 30, 2014 (54) CONFIGURABLE HARDWARE-SHARING USPC..... 341/143; 341/120; 341/155 MULTI-CHANNEL ADC (58) Fied

More information

FOR energy limited data networks, e.g., sensor networks,

FOR energy limited data networks, e.g., sensor networks, 578 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO., DECEMBER 009 An Optima Power Aocation Scheme for the STC Hybrid ARQ over Energy Limited Networks Hongbo Liu, Member, IEEE, Leonid Razoumov,

More information

SCHEDULING the wireless links and controlling their

SCHEDULING the wireless links and controlling their 3738 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 7, JULY 2014 Minimum Length Scheduing With Packet Traffic Demands in Wireess Ad Hoc Networks Yacin Sadi, Member, IEEE, and Sinem Coeri Ergen,

More information

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /GLOCOM.2003.

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /GLOCOM.2003. Coon, J., Siew, J., Beach, MA., Nix, AR., Armour, SMD., & McGeehan, JP. (3). A comparison of MIMO-OFDM and MIMO-SCFDE in WLAN environments. In Goba Teecommunications Conference, 3 (Gobecom 3) (Vo. 6, pp.

More information

Network Control by Bayesian Broadcast

Network Control by Bayesian Broadcast IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. IT-33, NO. 3, MAY 1987 323 Network Contro by Bayesian Broadcast RONALD L. RIVEST Abstract-A transmission contro strategy is described for sotted- ALOHA-type

More information

A Distributed Utility Max-Min Flow Control Algorithm

A Distributed Utility Max-Min Flow Control Algorithm A Distributed tiity Max-Min Fow Contro Agorithm Hyang-Won Lee and Song Chong Department of Eectrica Engineering and Computer Science Korea Advanced Institute of Science and Technoogy (KAIST) mshw@netsys.kaist.ac.kr,

More information

LBI Mobile Communications. EDACS TM Jessica. PBX Gateway. Operator s Manual

LBI Mobile Communications. EDACS TM Jessica. PBX Gateway. Operator s Manual Mobie Communications EDACS TM Jessica PBX Gateway Operator s Manua TABLE OF CONTENTS 1. SCOPE... 3 2. QUICK USAGE GUIDE... 4 2.1. Making Phone Cas From An EDACS Radio... 4 2.2. Caing EDACS Radios From

More information

Best Relay Selection Using SNR and Interference Quotient for Underlay Cognitive Networks

Best Relay Selection Using SNR and Interference Quotient for Underlay Cognitive Networks IEEE ICC 1 - Wireess Communications Symposium Best Reay Seection Using SNR and Interference Quotient for Underay Cognitive Networks Syed Imtiaz Hussain 1, Mohamed M. Abdaah 1, Mohamed-Sim Aouini 1,, Mazen

More information

SURGE ARRESTERS FOR CABLE SHEATH PREVENTING POWER LOSSES IN M.V. NETWORKS

SURGE ARRESTERS FOR CABLE SHEATH PREVENTING POWER LOSSES IN M.V. NETWORKS SURGE ARRESTERS FOR CABLE SHEATH PREVENTING POWER LOSSES IN M.V. NETWORKS A. Heiß Energie-AG (EAM), Kasse G. Bazer Darmstadt University of Technoogy O. Schmitt ABB Caor Emag Schatanagen, Mannheim B. Richter

More information

An Approach to use Cooperative Car Data in Dynamic OD Matrix

An Approach to use Cooperative Car Data in Dynamic OD Matrix An Approach to use Cooperative Car Data in Dynamic OD Matrix Estimation L. Montero and J. Barceó Department of Statistics and Operations Research Universitat Poitècnica de Cataunya UPC-Barceona Tech Abstract.

More information

Information Theoretic Radar Waveform Design for Multiple Targets

Information Theoretic Radar Waveform Design for Multiple Targets 1 Information Theoretic Radar Waveform Design for Mutipe Targets Amir Leshem and Arye Nehorai Abstract In this paper we use information theoretic approach to design radar waveforms suitabe for simutaneousy

More information

On optimizing low SNR wireless networks using network coding

On optimizing low SNR wireless networks using network coding On optimizing ow SNR wireess networks using network coding Mohit Thakur Institute for communications engineering, Technische Universität München, 80290, München, Germany. Emai: mohit.thakur@tum.de Murie

More information

Channel Division Multiple Access Based on High UWB Channel Temporal Resolution

Channel Division Multiple Access Based on High UWB Channel Temporal Resolution Channe Division Mutipe Access Based on High UWB Channe Tempora Resoution Rau L. de Lacerda Neto, Aawatif Menouni Hayar and Mérouane Debbah Institut Eurecom B.P. 93 694 Sophia-Antipois Cedex - France Emai:

More information

Non-Preemptive Interrupt Scheduling for Safe Reuse of Legacy Drivers in Real-Time Systems

Non-Preemptive Interrupt Scheduling for Safe Reuse of Legacy Drivers in Real-Time Systems Non-Preemptive Interrupt Scheduing for Safe Reuse of Legacy Drivers in Rea-Time Systems Tuio Facchinetti, Giorgio Buttazzo, Mauro Marinoni, and Giacomo Guidi University of Pavia, Itay {tuio.facchinetti,giorgio.buttazzo,

More information

Effect of Interfering Users on the Modulation Order and Code Rate for UWB Impulse-Radio Bit-Interleaved Coded M-ary PPM

Effect of Interfering Users on the Modulation Order and Code Rate for UWB Impulse-Radio Bit-Interleaved Coded M-ary PPM Effect of Interfering Users on the Moduation Order and Code Rate for UWB Impuse-Radio Bit-Intereaved Coded M-ary PPM Ruben Merz and Jean-Yves Le Boudec EPFL, Schoo of Computer and Communication Sciences

More information

Configuring RolandVersaWorks to print on your HEXIS media

Configuring RolandVersaWorks to print on your HEXIS media PRINTING DIVISION Product Buetin N 4 Configuring RoandVersaWorks to print on your HEXIS media 1. Instaing a media profie suitabe for your HEXIS printing media 1.1. Downoading the media profie 2 1.2. Importing

More information

Computer Science Clinic Overview

Computer Science Clinic Overview Harvey Mudd Coege Computer Science Department Computer Science Cinic Overview Robert M. Keer Professor & Director www.cs.hmc hmc.edu/cinic keer@cs.hmc hmc.edu 909-621-8483 History of Computer Science Cinic

More information

Resource Allocation for Network-Integrated Device-to-Device Communications Using Smart Relays

Resource Allocation for Network-Integrated Device-to-Device Communications Using Smart Relays Resource Aocation for Network-Integrated Device-to-Device Communications Using Smart Reays Monowar Hasan and Ekram Hossain Department of Eectrica and Computer Engineering, University of Manitoba, Winnipeg,

More information

Marketing tips and templates

Marketing tips and templates For financia adviser use ony. Not approved for use with customers. Marketing tips and tempates Heping you to grow your equity reease business The growing equity reease market can offer many opportunities

More information

On the Relationship Between Queuing Delay and Spatial Degrees of Freedom in a MIMO Multiple Access Channel

On the Relationship Between Queuing Delay and Spatial Degrees of Freedom in a MIMO Multiple Access Channel On the Reationship Between Queuing Deay and Spatia Degrees of Freedom in a IO utipe Access Channe Sriram N. Kizhakkemadam, Dinesh Rajan, andyam Srinath Dept. of Eectrica Engineering Southern ethodist University

More information

Energy Efficient Sensor, Relay and Base Station Placements for Coverage, Connectivity and Routing

Energy Efficient Sensor, Relay and Base Station Placements for Coverage, Connectivity and Routing Energy Efficient Sensor, Reay and Base Station Pacements for Coverage, Connectivity and Routing Mauin Pate*, R. Chandrasekaran and S.Venkatesan Teecommunication Engineering Program Erik Jonsson Schoo of

More information

RESEARCH OF UHV CIRCUIT BREAKER TRANSIENT RECOVERY VOLTAGE CHARACTERISTIC

RESEARCH OF UHV CIRCUIT BREAKER TRANSIENT RECOVERY VOLTAGE CHARACTERISTIC .P.B. Sci. Bu., Series C, Vo. 79, Iss. 3, 217 ISSN 2286-354 RESEARCH OF HV CIRCIT BREAKER TRANSIENT RECOVERY VOLTAGE CHARACTERISTIC Baina HE 1, Yunwei HAO 2 The most critica transient a circuit breaker

More information

Joint Congestion Control, Routing and Media Access Control Optimization via Dual Decomposition for Ad Hoc Wireless Networks

Joint Congestion Control, Routing and Media Access Control Optimization via Dual Decomposition for Ad Hoc Wireless Networks Joint Congestion Contro, Routing and Media Access Contro Optimization via Dua Decomposition for Ad Hoc Wireess Networks Francesco Lo Presti Dipartimento di Informatica Università de L Aquia opresti@di.univaq.it

More information

DESIGN OF SHIP CONTROLLER AND SHIP MODEL BASED ON NEURAL NETWORK IDENTIFICATION STRUCTURES

DESIGN OF SHIP CONTROLLER AND SHIP MODEL BASED ON NEURAL NETWORK IDENTIFICATION STRUCTURES DESIGN OF SHIP CONROLLER AND SHIP MODEL BASED ON NEURAL NEWORK IDENIFICAION SRUCURES JASMIN VELAGIC, FACULY OF ELECRICAL ENGINEERING SARAJEVO, BOSNIA AND HERZEGOVINA, asmin.veagic@etf.unsa.ba ABSRAC his

More information

Joint Beamforming and Power Optimization with Iterative User Clustering for MISO-NOMA Systems

Joint Beamforming and Power Optimization with Iterative User Clustering for MISO-NOMA Systems This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Citation information: DOI 0.09/ACCESS.07.70008,

More information

On the Relationship Between Capacity and Distance in an Underwater Acoustic Communication Channel

On the Relationship Between Capacity and Distance in an Underwater Acoustic Communication Channel On the Reationship Between Capacity and Distance in an Underwater Acoustic Communication Channe Miica Stojanovic Massachusetts Institute of Technoogy miitsa@mit.edu ABSTRACT Path oss of an underwater acoustic

More information

Time-domain Techniques in EMI Measuring Receivers. Technical and Standardization Requirements

Time-domain Techniques in EMI Measuring Receivers. Technical and Standardization Requirements Time-domain Techniques in EMI Measuring Receivers Technica and Standardization Requirements CISPR = Huge, Sow, Compex, CISPR = Internationa Specia Committee on Radio Interference Technica committee within

More information

A Comparative Analysis of Image Fusion Techniques for Remote Sensed Images

A Comparative Analysis of Image Fusion Techniques for Remote Sensed Images roceedings of the Word Congress on Engineering 27 Vo I WCE 27, Juy 2-4, 27, London, U.K. Comparative naysis of Image Fusion Techniques for emote Sensed Images sha Das 1 and K.evathy 2 Department of Computer

More information

Effect of Estimation Error on Adaptive L-MRC Receiver over Nakagami-m Fading Channels

Effect of Estimation Error on Adaptive L-MRC Receiver over Nakagami-m Fading Channels Internationa Journa of Appied Engineering Research ISSN 973-456 Voume 3, Number 5 (8) pp. 77-83 Research India Pubications. http://www.ripubication.com Effect of Estimation Error on Adaptive -MRC Receiver

More information

Multicast Routing Algorithms for Sparse Splitting Optical Networks 1

Multicast Routing Algorithms for Sparse Splitting Optical Networks 1 Muticast Routing Agorithms for Sparse Spitting Optica Networks 1 Presenter: Aniang Cai PhD candidate, Department of Eectronic Engineering, City University of Hong Kong, Hong Kong SAR Emai: caianiang@outook.com

More information

Configuring Onyx to print on your HEXIS media

Configuring Onyx to print on your HEXIS media Configuring Onyx to print on your HEXIS media 1. Instaing a media profie suitabe for your HEXIS printing media 1.1. Downoading the media profie 2 1.2. Importing the media profie into Onyx 3 2. Defaut setting

More information

Cross-layer queuing analysis on multihop relaying networks with adaptive modulation and coding K. Zheng 1 Y. Wang 1 L. Lei 2 W.

Cross-layer queuing analysis on multihop relaying networks with adaptive modulation and coding K. Zheng 1 Y. Wang 1 L. Lei 2 W. www.ietd.org Pubished in IET Communications Received on 18th June 2009 Revised on 30th Juy 2009 ISSN 1751-8628 Cross-ayer queuing anaysis on mutihop reaying networks with adaptive moduation and coding

More information

Spatial Reuse in Dense Wireless Areas: A Cross-layer Optimization Approach via ADMM

Spatial Reuse in Dense Wireless Areas: A Cross-layer Optimization Approach via ADMM IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Spatia Reuse in Dense Wireess Areas: A Cross-ayer Optimization Approach via ADMM Haeh Tabrizi, Member, IEEE, Borja Peeato, Member, IEEE, Gonaz Farhadi, Member,

More information

New Image Restoration Method Based on Multiple Aperture Defocus Images for Microscopic Images

New Image Restoration Method Based on Multiple Aperture Defocus Images for Microscopic Images Sensors & Transducers, Vo. 79, Issue 9, September 204, pp. 62-67 Sensors & Transducers 204 by IFSA Pubishing, S. L. http://www.sensorsporta.com New Image Restoration Method Based on Mutipe Aperture Defocus

More information

STUDY ON AOTF-BASED NEAR-INFRARED SPECTROSCOPY ANALYSIS SYSTEM OF FARM PRODUCE QUALITY

STUDY ON AOTF-BASED NEAR-INFRARED SPECTROSCOPY ANALYSIS SYSTEM OF FARM PRODUCE QUALITY STUDY ON AOTF-BASED NEAR-INFRARED SPECTROSCOPY ANALYSIS SYSTEM OF FARM PRODUCE QUALITY Xiaochao Zhang *, Xiaoan Hu, Yinqiao Zhang, Hui Wang, Hui Zhang 1 Institute of Mechatronics Technoogy and Appication,

More information

Spatial Characteristics of 3D MIMO Wideband Channel in Indoor Hotspot Scenario at 3.5 GHz

Spatial Characteristics of 3D MIMO Wideband Channel in Indoor Hotspot Scenario at 3.5 GHz Spatia Characteristics of 3D MIMO Wideband Channe in Indoor Hotspot Scenario at 3.5 GHz ei Tian Jianhua Zhang Yuxiang Zhang State Key ab. of Networking and Switching Tech. Beijing Univ. of osts and Teecom.

More information

Analysis, Analysis Practices, and Implications for Modeling and Simulation

Analysis, Analysis Practices, and Implications for Modeling and Simulation , Practices, and Impications for Modeing and imuation Amy Henninger The Probem The act of identifying, enumerating, evauating, and mapping known technoogies to inferred program requirements is an important

More information

Series 700A Power Processor

Series 700A Power Processor Series 700A Power Processor 5 25 SINGLE PHASE 10 500 THREE PHASE VOLTAGE REGULATION, ISOLATION, AND POWER DISTRIBUTION FOR CLEAN, SPIKE-FREE, STABLE VOLTAGE When Power Quaity Is A Must And Faiure Is Not

More information

An Optimization Framework for XOR-Assisted Cooperative Relaying in Cellular Networks

An Optimization Framework for XOR-Assisted Cooperative Relaying in Cellular Networks n Optimization Framework for XOR-ssisted Cooperative Reaying in Ceuar Networks Hong Xu, Student Member, IEEE, Baochun Li, Senior Member, IEEE bstract This work seeks to address two questions in cooperative

More information

Short Notes Lg Q in the Eastern Tibetan Plateau

Short Notes Lg Q in the Eastern Tibetan Plateau Buetin of the Seismoogica Society of America, Vo. 92, No. 2, pp. 87 876, March 2002 Short Notes Q in the Eastern Tibetan Pateau by Jiakang Xie Abstract spectra are coected from the 99 992 Tibetan Pateau

More information

Comparison of One- and Two-Way Slab Minimum Thickness Provisions in Building Codes and Standards

Comparison of One- and Two-Way Slab Minimum Thickness Provisions in Building Codes and Standards ACI STRUCTURAL JOURNAL Tite no. 107-S15 TECHNICAL PAPER Comparison of One- and Two-Way Sab Minimum Thickness Provisions in Buiding Codes and Standards by Young Hak Lee and Andrew Scanon Minimum thickness

More information

An Exact Algorithm for Power Grid Interdiction Problem with Line Switching

An Exact Algorithm for Power Grid Interdiction Problem with Line Switching 1 An Exact Agorithm for Power Grid Interdiction Probem with Line Switching Long Zhao, Student Member, IEEE, and Bo Zeng, Member, IEEE, Abstract Power grid vunerabiity anaysis is often performed through

More information

Probabilistic Scheduling Guarantees under Error Bursts in Controller Area Network (CAN)

Probabilistic Scheduling Guarantees under Error Bursts in Controller Area Network (CAN) Probabiistic Scheduing Guarantees under Error Bursts in Controer Area Network (CAN) Hüseyin Aysan, Radu Dobrin, and Sasikumar Punnekkat äardaen Rea-Time Research Centre, äardaen University, Västerås, Sweden

More information

THE EMERGING IEEE ad wireless local area

THE EMERGING IEEE ad wireless local area 1 Suboptima Spatia Diversity Scheme for 60 Gz Miimeter-Wave WLAN Zhenyu Xiao, Member, IEEE arxiv:1511.02326v1 [cs.it] 7 Nov 2015 Abstract This etter revisits the equa-gain (EG) spatia diversity technique,

More information

COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS

COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE80.15.3A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS Ms. Jina H. She PG Student C.C.E.T, Wadhwan, Gujarat, Jina_hshet@yahoo.com Dr. K. H. Wandra Director

More information

(12) United States Patent (10) Patent N0.: US 6,493,200 B1 Farmer et al. (45) Date of Patent: Dec. 10, 2002

(12) United States Patent (10) Patent N0.: US 6,493,200 B1 Farmer et al. (45) Date of Patent: Dec. 10, 2002 i US006493200B1 (12) United States Patent (10) Patent N0.: US 6,493,200 B1 Farmer et a. (45) Date of Patent: Dec. 10, 2002 (54) COAXAL CABLE PROTECTON DEVCE Primary Examiner EdWard H. Tso _ Assistant Examiner

More information

LIGHTNING PROTECTION OF MEDIUM VOLTAGE OVERHEAD LINES WITH COVERED CONDUCTORS BY ANTENNA-TYPE LONG FLASHOVER ARRESTERS

LIGHTNING PROTECTION OF MEDIUM VOLTAGE OVERHEAD LINES WITH COVERED CONDUCTORS BY ANTENNA-TYPE LONG FLASHOVER ARRESTERS C I R E D 17 th Internationa Conference on Eectricity Distribution Barceona, 12-15 May 23 LIGHTNING PROTECTION OF MEDIUM VOLTAGE OVERHEAD LINES WITH COVERED CONDUCTORS BY ANTENNA-TYPE LONG FLASHOVER ARRESTERS

More information

Online, Artificial Intelligence-Based Turbine Generator Diagnostics

Online, Artificial Intelligence-Based Turbine Generator Diagnostics AI Magazine Voume 7 Number 4 (1986) ( AAAI) Robert L. Osborne, Ph. D Onine, Artificia Inteigence-Based Turbine Generator Diagnostics introduction The need for onine diagnostics in the eectric powergeneration

More information