On Available Bandwidth in FDDI-Based Recongurable Networks. Sanjay Kamat, Gopal Agrawal, and Wei Zhao. Texas A&M University.
|
|
- Lester Neal
- 5 years ago
- Views:
Transcription
1 On Avaiabe Bandwidth in FDDI-Based Recongurabe Networks Sanjay Kamat, Gopa Agrawa, and Wei Zhao Department of Computer Science Teas A&M University Coege Station, Teas Abstract The increasing use of high-speed networks in mission safety critica appications has ed to a growing concern for reiabiity issues in network design. The conventiona approaches to evauating network reiabiity in terms of their connectivity or mean time to faiure are often not sucient to characterize the network reiabiity. A better measure of system reiabiity shoud quantitativey reect trac carrying capacity of the network in the presence of fauts. In this paper, we present a probabiistic anaysis of the avaiabe bandwidth of FDDI-based recongurabe networks given the number of ink fauts. Three networks of varying degree of recongurabiity are considered: fuy recongurabe, partiay recongurabe, and non-recongurabe networks. The partiay recongurabe networks are found to be an eceent compromise between high reiabiity and the ease of impementation. A method of impementing the partiay recongurabe network using eisting FDDI technoogy is proposed. 1
2 Contents 1 Introduction Background : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Previous work : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : About this paper : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 2 2 The network architectures Network mode : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Faut mode : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Reconguration capabiities of FBRNs : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Three network architectures : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Reconguration agorithm for an FBRN : : : : : : : : : : : : : : : : : : : : : : : : : : : 6 3 Anaysis of avaiabe bandwidth Metrics : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Computing A(; ) : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Non-recongurabe network : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Fuy recongurabe network : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Partiay recongurabe network : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Theorem for computing AX(; ) : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Numerica resuts : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Computing E[s j ] : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Non-recongurabe network : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Fuy recongurabe network : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Partiay recongurabe network : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Numerica resuts : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Taking wrap-around into account : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 17 4 Concusions 17 5 References 18 2
3 1 Introduction 1.1 Background The use of computer and communication networks in mission safety critica environments is becoming increasingy common. A major concern in the design of such networks is their vunerabiity to fauts or damages inicted by component faiures and/or enemy attacks. The objective of this paper is to address reiabiity issues in FDDI-based networks. Much of the work on network reiabiity has been based on connectivity. In this kind of studies, a network is considered operationa if it is connected, i.e., communication paths eist among a nodes. Measures such as the minimum or average number of fauts that wi disconnect the network are studied. However, in many appications connectivity aone is not sucient to assess the network operationa status. As pointed out by Wikov in [20], a reiabiity measure shoud quantitativey reect the trac-carrying capacity of a network in the presence of fauts. In this paper, we focus on the avaiabe bandwidth as a measure of the reiabiity of a network. We seected FDDI (Fiber Distributed Data Interface) networks for this study. FDDI is an ANSI standard for a 100 Mbits/sec ber optic token ring network [1, 2]. FDDI is suitabe for mission safety critica appications not ony because of its high bandwidth but aso due to its bounded access time and its dua oop architecture. Many new civi and miitary networks are being deveoped based on the skeeton of FDDI. Eampes incude the High-Speed Data Bus and the High-Speed Ring Bus (HSDB/HSRB) [17, 18, 19], the Survivabe Adaptabe Fiber Optic Embedded Network (SAFENET) [4, 9, 11], and Fiber Distributed Data Network (FDDN) [3]. In its basic conguration, an FDDI network consists of two counter-rotating oops. These two uni-directiona ber oops together constitute what is known as the FDDI trunk ring. This architecture provides certain faut toerant properties to FDDI networks. For eampe, most eisting FDDI networks use one oop as primary oop and the other as backup. In the event of a faut on the primary oop, the backup oop is used for transmission. However, this basic conguration may not be abe to toerate two or more fauts. That is, in the worst case two ink fauts wi disconnect the network. To overcome this probem, Raph, Ukrainsky, Scheack, and Weinberg [15] proposed an aternate path FDDI topoogy that uses two FDDI trunk rings. In their network, each station connects to an FDDI concentrator which subsequenty connects itsef to the two trunk rings. By utiizing the buit-in reconguration capabiity in a concentrator it was showed that the network can remain connected in the presence of more than two ink fauts. This soution has signicant practica vaue since it can be impemented using currenty avaiabe FDDI components. However, the avaiabe bandwidth characteristics of such networks during a fauty situation have not been anayzed. Generaizing the idea of aternate path FDDI topoogy, we consider an FDDI-based recongurabe network (FBRN) consisting of n nodes and r FDDI trunk rings. That is, each node is inserted into the r rings. Consequenty, each node has r inks incident on it on the eft and r inks incident on the right. A node has certain reconguration capabiity: a eft ink can be connected to one of m right inks. This is a generaization of the traditiona FDDI network and that proposed in [15]. In a traditiona FDDI network, r = 1 and m = 1 whie for the network considered in [15], r = 2 and m = 2. We are going to study the avaiabe bandwidth of an FBRN given that there are certain number of ink fauts. Ceary, the avaiabe bandwidth depends on not ony the number of FDDI trunk rings (r) but aso the reconguration capabiity of the network. We wi consider three FBRN architectures characterized by their degree of recongurabiity: 1
4 1. Non-Recongurabe Network (N-FBRN): The nodes in these networks have no reconguration capabiity. In other words, m = Fuy Recongurabe Network (F-FBRN): In these networks, a node can recongure the connection of any of its input inks to any of the output inks, i.e., m = r. 3. Partiay Recongurabe Network (P-FBRN): This architecture provides an intermediate degree of recongurabiity, i.e., 0 < m < r. In this paper we wi consider a particuar P-FBRN architecture with m = 2. These network architectures wi be further described in Section 2. In this paper, we wi anayze the avaiabe bandwidth characteristics of the above networks using the foowing measures: 1. The probabiity that the avaiabe bandwidth eceeds a specied vaue for a given number of ink fauts. 2. The epected vaue of avaiabe bandwidth, given the number of ink fauts. These metrics provide a generaization of the traditiona connectivity oriented metrics in the sense that zero avaiabe bandwidth impies that the network is disconnected. As epected, we nd that the fuy recongurabe network has the best avaiabe bandwidth characteristics. However, such a network is dicut to impement. We nd that partiay recongurabe networks, which can be reaized using the eisting commercia products, show a substantia improvement in reiabiity over the non-recongurabe networks. 1.2 Previous work An overview of the reiabiity provisions for the FDDI token ring can be found in [16]. The reiabiity of various network congurations supported by the FDDI standard is discussed in [13]. A comparative anaysis of various station attachment schemes based on the end-to-end user reiabiity and the mean time to faiure metrics is presented in [10]. An automatic faiure isoation and reconguration methodoogy for FDDI is described in [21]. Reiabiity anaysis for dua homing FDDI networks is presented in [12]. The use of two FDDI trunk rings to interconnect stations by concentrators was rst proposed in [15]. Our study etends their scheme to buid a mutipe ring FDDI-based network. In [6], Hies and Marow propose an FDDI concentrator tree topoogy with oopback which can toerate mutipe fauts. For a recent survey on various approaches for improving the reiabiity in FDDI networks, the reader is referred to [5]. 1.3 About this paper This paper is organized as foows. In Section 2, we dene the system mode and discuss three muti-ring architectures with dierent degrees of recongurabiity. Metrics for anayzing the avaiabe bandwidth in a fauty network are dened in Section 3. The performance resuts for these schemes with respect to these metrics are presented. We present our concusions in Section 4. 2
5 2 The network architectures 2.1 Network mode FDDI is a high-speed, ber-optic token ring network. The FDDI trunk ring actuay consists of two uni-directiona counter-rotating ber oops, each capabe of transmitting data at 100 megabits per second. Both the oops within an FDDI trunk ring can be used for data transmission at the same time providing a tota bandwidth of 200 megabits per second. However, most eisting FDDI networks use ony one oop for transmission reserving the other as backup. In the event of a faut on the primary oop, it is possibe to switch to the secondary oop. When a faut at a point of the trunk aects each of the oops, the network can perform a wrap-around, i.e, the primary and the secondary oops are wrapped to isoate the faut. The operation of wrapping resuts in a singe oop having a bandwidth of 100 megabits per second. Thus, the basic FDDI trunk ring provides some buit-in faut toerance capabiities. Note however, that more than one faut on each of the oops wi disconnect the network, dividing it into isoated segments. The need for providing greater bandwidth and increased faut toerance is the motivation for enhancing the basic FDDI topoogy. Both these goas can be achieved by using mutipe trunk rings to connect the individua nodes. Specicay, we use r FDDI trunk rings to interconnect n nodes. Each node has certain reconguration capabiity. Reconguration capabiity of a network comes into pay when the wrap around capabiity can not be used to recover from the fauts. The reconguration capabiity of the nodes makes it possibe to have a trunk segment beong to dierent trunk rings at dierent times. This faciitates isoation of fauty trunk segments in the network and utiization of faut-free segments to provide high avaiabe bandwidth. We ca such muti-ring networks FDDI based recongurabe networks (FBRNs). The detais of reconguration capabiities of FBRNs wi be discussed shorty. In an FBRN, each FDDI trunk ring is treated as one entity at east as far as reconguration is concerned. Reca that an FDDI trunk ring consists of two counter-rotating oops. In this paper, we wi assume that one oop within a trunk ring is used for transmission and the other is reserved as backup. However, our anaysis can be easiy etended for the case when both the oops are used simutaneousy. We denote the trac carrying capacity of a faut-free FDDI trunk ring as one unit. It is convenient to dene some terminoogy for FBRNs. To avoid repetitiousness, we wi use the term ring to mean an FDDI trunk ring. The section of a ring between two neighboring nodes on the network is caed a ink. With n nodes and r rings, there are n r distinct inks in the network. The coection of a the inks between two neighboring nodes wi be caed a bunch. Hence, there are n bunches in the network with each bunch consisting of r inks. 2.2 Faut mode Reiabiity issues in ring networks arise from ikey fauts in individua nodes and the inks connecting the nodes. The objective in designing a reiabe ring network is to maintain the connectivity of nodes in spite of such fauts when they occur. Node fauts in a ring can be handed by removing the fauty node from the ring. FDDI provides an optica bypass mechanism at a node which can be activated to remove that node from the ring. If a node performs some critica functions, then these functions must be dupicated esewhere on the ring so that a faut at that node does not disrupt the network service. Hence, in this study, we disregard node faiures and concentrate on ink fauts. Note that a ink was dened as a segment of an FDDI trunk ring. Hence, it consists of a pair of ber segments beonging to the two counter-rotating oops which constitute the ring. There are two 3
6 kinds of ink fauts: one in which ony one oop is aected and the other where both the oops are aected. The rst kind of ink faut may be handed within the FDDI trunk ring by hopping to the other oop if the other oop is faut-free. An FDDI trunk ring can recover from the second kind of ink faut by wrapping the two oops together on both the sides of the point of faiure. Note that this does not work if there are more than one such ink fauts on a ring. In this case, the reconguration capabiity of the nodes is used to recover from such fauts. In this paper, we concentrate on the second kind of ink fauts. Due to the spatia proimity of the two ber segments constituting a ink, it is ikey that a ink faut may aect both the segments. This is particuary true in a miitary environment where the fauts are a consequence of enemy attacks. We wi assume that a inks have the same probabiity of faiure. We consider a ink to be either in active state or in faied state. A ink in the faied state cannot carry trac. A ink is considered active if it is faut-free. We dene the state of the system as the combination of the states of a the inks in the network. Since there are n r inks, there are in a 2 possibe system states. Further, the number of system states in which there are eacty ink fauts is Reconguration capabiities of FBRNs We assume that initiay, a rings are functiona with each ring contributing one unit of bandwidth. Hence, the network can provide a maimum avaiabe bandwidth of r units when a inks are functiona. The avaiabe bandwidth reduces when some inks fai. The impact of such faiures on the avaiabe bandwidth depends on the abiity of the network to dynamicay recongure itsef in the event of ink fauts. We wi now consider three network architectures with varying degree of recon- gurabiity Three network architectures Two etreme cases of recongurabiity are described rst. Non-Recongurabe Network (N-FBRN). In this case, each ink between two neighboring nodes permanenty beongs to a distinct ring. If a ring has a fauty ink, it stops functioning. Fuy Recongurabe Network (F-FBRN). In this case, there is a switch at each node which makes it possibe to route messages from one trunk ring to another. As a resut, a ink may beong to dierent rings at dierent times depending on the conguration of the switches. The network management entity at each node tries to use as many active inks of a bunch as possibe. The dierence between two networks is iustrated in Figure 1. In this gure ring 3 and ring 4 have two fauty inks as shown. For a non-recongurabe network depicted in Figure 1(a), the avaiabe bandwidth is reduced from origina 4 units to 2 units, since ring 1 and ring 2 are the ony active rings. Further, note that neither ring 3 nor ring 4 can wrap around its two oops as both the rings have two fauts each. However, with fu reconguration capabiity at the nodes, nodes A and C are 1 p q denotes the number of combinations of p objects taken q at a time. 4
7 A A B D B D C (a) C (b) Figure 1: Eampe 1 A A B D B D C (a) C (b) Figure 2: Eampe 2 5
8 can be recongured to merge the segments of rings 3 and 4 as shown in Figure 1(b). Thus, for the same faut pattern, the avaiabe bandwidth is 3 units in an F-FBRN. It is evident that the addition of recongurabiity woud improve the avaiabe bandwidth of the network in the presence of fauts. However, a node in a fuy recongurabe network is compe, particuary when the number of rings is arge. However, in Appendi we wi show how a fuy recongurabe network of 2 trunk rings can be impemented by using eisting FDDI products. Using such smaer recongurabe networks as buiding bocks we can consider a third scheme which provides partia recongurabiity. Partiay Recongurabe Network (P-FBRN). This architecture is a compromise between the high eibiity of the F-FBRN architecture and the ow impementation costs of the N-FBRN architecture. In these networks, the nodes are connected using an even number of rings. The r rings are organized as r distinct ring-pairs. 2 Reconguration is possibe ony between rings within a ring-pair but not across ring-pairs. In other words, the n nodes are interconnected using r F-FBRNs each with two rings. 2 For the faut pattern of Eampe 1 shown in Figure 1, the avaiabe bandwidth of a partiay recongurabe network is the same as that provided by fu recongurabiity. However, Figure 2 iustrates an eampe where fu recongurabiity eads to higher avaiabe bandwidth than partia recongurabiity. In this eampe, a the four rings have ink fauts. With partia recongurabiity, segments of rings 1 and 2 or 3 and 4 may be merged by using the reconguration capabiity of the nodes. Figure 2(a) shows how rings 1 and 2 are merged to savage one unit of bandwidth. Note however that the specic ocation of ink fauts between nodes A and B precudes the merging of rings 3 and 4. Thus, with the partia recongurabiity, ony one unit of bandwidth is avaiabe due to the presence of fauts. However, with fu reconguration capabiity at the nodes, iustrated in Figure 2(b), two units of bandwidth are avaiabe by merging segments of rings 1 and 2 into one ring and those of rings 2 and 3 into another. Nevertheess, the partia reconguration network has the advantage that it can be impemented using eisting FDDI technoogy as discussed in the Appendi. We wi aso see ater that in most cases, the partiay recongurabe network has a much better avaiabe bandwidth characteristics than the non-recongurabe network, whie not being too far behind the fuy recongurabe network Reconguration agorithm for an FBRN Given an FDDI-based recongurabe network (FBRN), once the ink fauts are detected, a reconguration agorithm shoud be eecuted to decide how to recongure the system. The current FDDI standard has specied a faut detection process which is sti appicabe to our FBRNs. Here, we discuss a reconguration agorithm. The N-FBRNs have no provision for reconguration. P-FBRNs are buit using mutipe F-FBRNs with two rings. Hence, we ony need to consider the reconguration agorithm for F-FBRNs. The reconguration agorithm is eecuted at each node after the faut detection process has been eecuted. Hence, a the nodes have a knowedge of the state of the inks incident on them (i.e., fauty or active). Let Left N [i] and Right N [i] denote the inks from ring i incident on node N on its eft and right respectivey. The pseudo code of the agorithm is as foows. 1. For (i = 1; i r; i++) mark Right N [i] unassigned. 6
9 2. for (i = 1; i r; i++) if (Left N [i] is active) then a. connect Left N [i] to Right N [j] for the smaest j such that Right N [j] is active and has not been assigned, and b. mark Right N [j] assigned. 3. wrap together both the oops of unassigned inks. We note that some of the systems (e.g., some eisting FDDI trunk rings) may not have wrap up capabiity. For this kind of system, Step 3 of the above agorithm shoud be skipped. We are now going to derive the avaiabe bandwidth in an F-FBRN using the above reconguration agorithm for both cases of with or without the wrap up step. We need a notation rst. Reca that an FBRN architecture consists of n bunches with r inks per bunch. Let h 1 ; h 2 ; : : :h n?1 ; h n denote the number of fauty inks in a the bunches arranged in a non-decreasing order, i.e., h i h i+1 for i = 1; : : :; n? 1. THEOREM 2.1 The avaiabe bandwidth in an F-FBRN using the above reconguration agorithm is 1. (r? h n ) units if the wrap up option is not used; 2. (r? h n?1 ) units if the wrap up option is used. Due to the space imitation, the proof of the theorem is not presented here. The interested reader is referred to [8] for it. However, the theorem can be intuitivey epained as foows. When the wrap up option is not used, obviousy, the avaiabe bandwidth is at most (r? h n ) units, where h n is the number of damages in the maimay damaged bunch. The above theorem assures that this bandwidth is achieved by the recongurabe agorithm. With the wrap up of oops within a damaged trunk, each ring with ony one ink faut can be restored in step 3 of the above agorithm. It can be shown that the number of such rings is (h n? h n?1 ). Hence the avaiabe bandwidth with wrap up is (r? h n ) + (h n? h n?1 ) units or (r? h n?1 ) units. 3 Anaysis of avaiabe bandwidth In this section, we derive probabiistic characteristics of avaiabe bandwidth for the three network architectures described earier. 3.1 Metrics It is usefu to introduce the foowing notations. = number of fauty (damaged) inks. k = units of bandwidth that are unavaiabe due to ink fauts. s = avaiabe bandwidth. That is, s = r? k: (1) 7
10 Note that for a set of random ink fauts, s is a discrete random variabe. The vaue of s for a network depends on the number of random ink fauts () and their distribution in the network. We wi use f sj () to denote the probabiity mass function of s conditioned on the vaue of. That is, f sj () = Prob(s = j ): (2) a X (n; r; ; k) = tota number of system states with ink fauts such that eacty k units of bandwidth are not avaiabe in a network X. b X (n; r; ; k) = tota number of system states with ink fauts such that at most k units of bandwidth are not avaiabe in a network X. b X (n; r; ; k) and a X (n; r; ; k) are reated as a X (n; r; ; k) = b X (n; r; ; k)? b X (n; r; ; k? 1): (3) The subscript X in the above notations denotes one of the three architectures described in Section 2. We wi use etters N, P and F to correspond to networks N-FBRN, P-FBRN, and F-FBRN respectivey. We consider two metrics for studying the avaiabe bandwidth characteristics of a network: 1. The conditiona probabiity that at east units of bandwidth are avaiabe, given that the number of fauty inks in the network is, denoted A(; ). Formay, A(; ) = rx s= f sj () (4) 2. The epected vaue of avaiabe bandwidth, given that inks in the network are fauty, denoted E[s j ]. From the denition of epectation, E[s j ] is obtained as E[s j ] = rx =1 f sj () (5) As before, a subscript X wi be used to indicate the use of these metrics in the contet of a specic network X. In anayzing the overa reiabiity of a network, an important consideration is whether a nodes can communicate in the presence of network fauts. Whie maintaining connectivity among a nodes is necessary for the nodes to be abe to communicate, it is not sucient to ensure an acceptabe eve of service. The eve of service depends on the trac carrying capacity of the network. The above metrics emphasize this aspect of reiabiity. We now present the anaysis of the three FBRNs with respect to the above metrics. For the purpose of simpicity, we wi start with the case when the wrap up is not used. Etension of our anaysis to the case when the wrap up is used wi be discussed ater. Aso note that the vaues of metrics for the no wrap up case provide ower bounds for the wrap up case. 3.2 Computing A(; ) We wi now derive the rst metric dened earier i.e., the conditiona probabiity that the avaiabe bandwidth is at east given random ink fauts, for the three networks dened in Section 2. We wi rst derive combinatoria quantities a(n; r; ; k) and b(n; r; ; k) for the three networks. Then we use them to estabish the desired resut. 8
11 3.2.1 Non-recongurabe network The foowing emma provides the reevant resut for the N-FBRN i.e., the non-recongurabe mutiring network. LEMMA 3.1 a N (n; r; ; k) is given by a N (n; r; ; k) = r k kx i=0 (?1) i nk? ni k i : (6) Proof: Reca that a oss of k bandwidth units in a non-recongurabe network is caused by eacty r k fauty rings. These k fauty rings can be seected in ways, which is the rst factor in the right k hand side of (6). We now show that the second factor in (6) corresponds to the number of ways in which out of k r inks from k rings can be fauty, such that each of the k rings has at east one fauty ink. Given a particuar set of k rings abeed 1 k, et B i denote the set of system states in which at east one ink from ring i is fauty. Thus S k i=1 B i denotes the set of system states where a the ink fauts beong to the specic k rings. Since there are ink fauts, the size of this set is foowing discussion, we wi consider S k i=1 B i as the universa set. nk. In the Our interest is in nding the size of the set T k i=1 B i. Using the resuts from set theory, this can be obtained as foows. n( k\ i=1 B i ) = n([ k i=1 B i)? n(\ k i=1 B i) = = = = nk nk nk kx i=0? n([ k i=1 B i)? f? ( X 1ik k 1 (?1) i nk? ni n(b i )? nk? n X 1i<jk n(b i \ B j ) + X 1i<j<mk n(b i \ B j \ B m )? : : : g? k nk? 2n + k nk? 3n? : : : 2 3 k i : (7) This estabishes the desired resut Fuy recongurabe network It is dicut to obtain a cosed form soution for this network for arbitrary vaues of n and r. However, we can obtain a recurrence reation for b(n; r; ; k) as stated in the foowing emma. ) 9
12 LEMMA 3.2 b F (n; r; ; k) satises the foowing reation: b F (n; r; ; k) = 8 >< >: 0 > n k, P kj=0 b F (n? 1; r;? j; k) r j < k, k n k and n > 2: (8) For the base case of n = 2, we have b F (2; r; ; k) = kx j=ma(0;?k) r j r? j : (9) Proof: The rst boundary condition is easiy estabished using the pigeonhoe principe. If > n k, at east one of the n bunches must have more than k fauty inks. The second boundary condition foows from the fact that with < k we cannot have a bunch with more than k fauty inks. To derive the recurrence reation, consider the set of a system states with ink fauts which resut in a oss of at most k bandwidth units in an F-FBRN. This set can be partitioned into mutuay ecusive subsets based on the number of ink fauts from a particuar bunch. If this bunch has eacty j ink fauts r (which coud happen in ways), then the remaining? j fauts must be distributed in an identica j fuy recongurabe network with n? 1 nodes aowing for at most k units of oss in bandwidth. The base case for the recurrence is for a network with ony two nodes, i.e., n = 2. The epression for this case is obtained by noting that the system state is dened by the j fauty inks from one bunch and the corresponding? j fauty inks in the other. Note that neither j nor? j can eceed k. 2 The specia case of r = 2, is more amenabe to anaysis as seen from the foowing resut. LEMMA 3.3 a F (n; 2; ; k) for > 0 is obtained as foows a F (n; 2; ; k) = 8 >< >: 0 k = 0 or k > 2, n 2 k = 1, 2n? n 2 k = 2. (10) Proof: It is obvious that > 0 impies that the avaiabe bandwidth must reduce at east by one and hence a F (n; 2; ; 0) = 0. The case of k > 2 is trivia since there are ony two rings. To nd the number of system states which ead to oss of eacty one bandwidth unit, we observe that such states cannot have a bunch with both of its inks fauty. Since there are fauty inks, there must be n eacty bunches with one ink fauty in each of them. These bunches can be seected in ways and corresponding to each such seection, there are 2 ways of picking up the damaged inks in these 10
13 bunches. Hence, there are n 2 distinct system states corresponding to a F (n; 2; ; 1). Since, for non-zero, either one or two bandwidth units may be ost, and since ways in which out of the 2n inks may be fauty, a F (n; 2; ; 2) is obtained as 2 We wi nd this emma usefu in anayzing the partiay recongurabe network Partiay recongurabe network 2n is the tota number of The foowing resut estabishes a recurrence reation to compute a(n; r; ; k) for P-FBRN. 2n? a F (n; 2; ; 1). LEMMA 3.4 a P (n; r; ; k) satises the foowing recurrence reation X n a P (n; r; ; k) = a P (n; r? 2; ; k) + a P (n; r? 2;? j; k? 1) 2 j j j=1 ( ) X 2n + a P (n; r? 2;? j; k? 2)? 2 n j : (11) j j j=2 Proof: Reca that the partiay recongurabe network of r rings is composed of r pairs of rings with 2 each pair being a fuy recongurabe network. However, there is no switching from a ring from one pair to that from another. Consider the set of a system states in which inks are fauty and eacty k units of bandwidth are ost in case of P-FBRN. This set can be partitioned into three casses based on the status of one specic pair: 1. No ink fauts in this pair of rings. 2. Some ink fauts in this pair with eacty one unit of bandwidth ost. 3. Some ink fauts in this pair with eacty both units of bandwidth ost. In the rst case, the probem reduces to seecting fauty inks in a simiar network with one ess pair of rings and eacty k units of oss in bandwidth. The second and the third case simiary reduce to smaer equivaent probems. In these cases, we rst consider j(j > 0) ink fauts in this pair and use the resuts of emma 3.3 for mutipicative factors. Summing over a possibe vaues of j gives the desired resut Theorem for computing A X (; ) Given that we have obtained either a(n; r; ; k) or b(n; r; ; k) for each of the networks, we now can estabish the foowing theorem that uses the vaues of either of these combinatoria quantities to compute A(; ). 11
14 THEOREM 3.1 A X (; ) for any network X is given by A X (; ) = = r? X k=0 r? X k=0 a X (n; r; ; k) b X (n; r; ; k)? b X (n; r; ; k? 1) : (12) Proof: Let U X (n; r; ; k) denote the probabiity that eacty k bandwidth units are unavaiabe for a particuar network X, given that inks have faied. Hence A X (; ), the conditiona probabiity that the avaiabe bandwidth for network X is at east can be obtained in terms of U X (n; r; ; k) as A X (; ) = r? X k=0 U X (n; r; ; k): (13) Since there are n r inks in the network, is the tota number of congurations in which distinct inks may be fauty. Hence, the conditiona probabiity that eacty k units of bandwidth are unavaiabe is or equivaenty U X (n; r; ; k) = a X(n; r; ; k) ; (14) U X (n; r; ; k) = b X(n; r; ; k)? b X (n; r; ; k? 1) (15) where a X (n; r; ; k) and b X (n; r; ; k) are dened in Section Thus, A X (; ) for the three networks discussed in Section 2 can be computed using (12) in conjunction with the resuts of the emmas of this section Numerica resuts The numerica resuts for A(; ) for some network parameters are potted in Figure 3. The network is assumed to have 20 nodes with 6 rings (i.e., n = 20 and r = 6). From this gure, it is evident that the partiay recongurabe network has a signicanty better reiabiity than the non-congurabe network if the avaiabiity of 3 or more units of bandwidth is critica for the network. As seen from Figure 3, a faiure of 10 inks (which constitutes approimatey 8% of the tota of 120 inks in the network) impies that the probabiity that at east two units of bandwidth are avaiabe is very ow for the non-recongurabe network. For the same conditions, the partiay recongurabe network has a much better performance. Simiar observations can be made from Figure 4. However, as seen from Figure 5, a more stringent requirement such as a high probabiity of having 4 out of 6 units avaiabe can be satisfactoriy met ony using a fuy recongurabe network. 12
15 1.00 A(2,) N-FBRN P-FBRN F-FBRN Figure 3: A(2, ) for dierent networks 0.80 A(3,) N-FBRN P-FBRN F-FBRN Figure 4: A(3, ) for dierent networks 13
16 A(4,) N-FBRN P-FBRN F-FBRN Figure 5: A(4, ) for dierent networks 3.3 Computing E[s j ] The epected vaue of avaiabe bandwidth s, when r random ink fauts occur, can be obtained as E[s j ] = = = = rx s=1 rx k=0 rx k=0 rx k=0 s f sj (s) (16) (r? k) U(n; r; ; k) (17) a(n; r; ; k) (r? k) (18) b(n; r; ; k)? b(n; r; ; k? 1) (r? k) (19) However, a dierent approach towards computing the mean avaiabe bandwidth eads to simper epressions. The foowing theorems provide the resuts for various network architectures of interest Non-recongurabe network THEOREM 3.2 For the non-recongurabe network, the epected vaue of the avaiabe bandwidth, 14
17 given that there have been random ink fauts, is given as foows: E N [s j ] = r? n : (20) Proof: Consider the r rings to be abeed from 1 to r. Let s i denote a discrete random variabe dened as ( 1 if ring i has no fauty inks s i = (21) 0 otherwise. Hence the avaiabe bandwidth s is obtained as s = rx i=1 Note that a s i 's are identicay distributed. Hence, E[s j ] = rx i=1 s i : (22) E[s i j ] = r E[s i j ]: (23) From the denition of s i, it foows that E[s i j ] is same as Prob(s i = 1 j ink fauts). This probabiity is easiy seen to be? n. Hence we obtain the resut (20) Fuy recongurabe network The genera case for this network is dicut to anayze. Numerica vaues of the mean avaiabe bandwidth can be obtained using (16). However, we have the foowing usefu resut for the specia case when r = 2. THEOREM 3.3 For the fuy recongurabe network with r = 2, the epected vaue of the avaiabe bandwidth, given that there have been random ink fauts, is E F [s j ] = 8 >< >: n 2n 2 > 0, 2 = 0 : 2 Equating the epression for the mean avaiabe bandwidth given by (20) with that obtained using (16) and the resuts of emma 3.1 gives us the foowing interesting combinatoria identity rx r?s? X n r r = s (?1) i? ns? ni s s=0 i=0 As yet, we do not know of any other proof for this identity. r? s i : (24) 15
18 N-FBRN P-FBRN F-FBRN E[s ] Figure 6: Mean Avaiabe Bandwidth Proof: The case of = 0 is trivia. For > 0, the resut foows by direct appication of (16) with the probabiities obtained using (14) and by emma Partiay recongurabe network THEOREM 3.4 For the partiay recongurabe network, the epected vaue of the avaiabe bandwidth, given that there have been random ink fauts, is E P [s j ] = r 2 P q=1 n q? 2n 2 q? q + r? 2n : (25) Proof: This resut can be proved using simiar reasoning as in Theorem 3.2 with s i being dened for the ith pair of rings (i.e, rings 2i? 1 and 2i) Numerica resuts The performance of the three networks based on the mean avaiabe bandwidth is shown in Figure 6. These gures are based on the same network parameters as before, i.e., n = 20, r = 6. The foowing observations can be made from Figure 6: 16
19 For a three network architectures, the mean avaiabe bandwidth decreases with increase in the number of fauty inks () as epected. For a sma vaue of, a three systems have comparabe performance. The abiity of a network to recongure itsef is tested ony when the number of ink fauts is sucienty high. On the other hand, a very arge vaue of means a heavy damage to the network and a the reconguration schemes tend to have a ow avaiabe bandwidth as is increased beyond a certain vaue. As epected, the mean avaiabe bandwidth for the fuy recongurabe system is the highest whie that for the non-recongurabe system is the owest. However, the partiay recongurabe system which is much easier to impement than the fuy recongurabe system has a very good performance. It is seen that partiay recongurabiity provides a signicant improvement over the non-recongurabe mutipe ring architecture. For eampe, when = 20, i.e., when 16:67% of the inks are fauty, the N-FBRN has an amost zero mean avaiabe bandwidth. On the other hand, for the same conditions, the mean avaiabe bandwidths of P-FBRN and F-FBRN are cose to 2 units and 3 units respectivey. 3.4 Taking wrap-around into account The anaysis presented so far did not consider the possibiity of wrapping around the two counterrotating oops of a trunk to recover from a singe point trunk faut. Etension of our anaysis to take this possibiity into account is possibe, athough the corresponding derivations become tedious. The genera approach is to consider the number of rings with singe faut separatey. The simpest case is that of deriving the mean avaiabe bandwidth for the non-recongurabe network i.e., E N [s j ]. To take wrap around in account, in Theorem 3.2, we change the denition of s i, the bandwidth contributed by ring i so that s i = 1 if ring i has 0 or 1 fauty inks. From straight forward combinatoria arguments, the probabiity of s i being 1 can then be obtained as Prob(s i = 1 j ink fauts) =? n Mutipying this probabiity by r gives the mean avaiabe bandwidth. + n? n? 1 : (26) For the genera case of fuy recongurabe networks, Theorem 2.1 indicates that consideration of wrap around impies that the mean avaiabe bandwidth is r? E[h n?1 j ], where h n?1 denotes the second argest number of inks damaged in a bunch. Reca that the sequence h 1 ; h 2 ; : : :h n denotes the number of inks damaged in the n bunches sorted in non-decreasing order. h n?1 is the second order statistic. An approach woud be to derive the distribution or the epectation of order statistics for these random variabes. For a more detaied discussion on these issues, see [8]. 4 Concusions In this paper we proposed the use of mutipe FDDI rings with recongurabe architecture. Our objective is to provide a signicant improvement over the standard FDDI networks in terms of connectivity and avaiabe bandwidth. We studied three FDDI based recongurabe networks varying in the degree of recongurabiity supported by the network nodes. We derived the probabiity of the avaiabe bandwidth eceeding a certain given vaue and the mean vaue of avaiabe bandwidth for 17
20 a given number of ink fauts. One of the important observations is that a partiay recongurabe network architecture provided a much better performance than a non-recongurabe network. The partiay recongurabe network is particuary attractive because it can be reaized using commerciay avaiabe FDDI products. The work done here can be etended in severa interesting ways. For eampe, dierent partia recongurabe networks other than the one discussed here can be investigated for their reaizabiity using currenty avaiabe FDDI products. Currenty we are working on the design and anaysis of a concentrator which can connect four FDDI trunk rings. Use of such a concentrator in a P-FBRN woud certainy resut in better performance than the one we considered in this paper. References [1] FDDI Token ring media access contro (MAC). ANSI Standard X3.139, [2] ANSI Standard X3T9.5, Fiber Distributed Data Interface (FDDI) - Token Ring Medium Access Contro (MAC) May, [3] M. D. Cohn, \A network architecture for advanced aircraft", Proc. IEEE Conf. on Loca Computer Networks, pp , Minneapois MN, Oct , [4] D. T. Green and D. T. Marow, \SAFENET { A LAN for navy mission critica systems", Proc. of 14th Conf. on Loca Computer Networks, [5] W. Hies, and D. Marow, \Approaches for survivabiity in FDDI networks", Proc. of 17th Conf. on Loca Computer Networks, [6] W. Hies, and D. Marow, \Eperimentation on the concentrator tree with oopback", Proc. of 18th Conf. on Loca Computer Networks, [7] M. J. Johnson, \Reiabiity mechanisms of the FDDI high bandwidth token ring protoco", Computer Networks ISDN Systems, Vo. II., No. 2, pp , [8] S. Kamat, \Performance issues in high-speed rea-time networks", PhD Thesis, under preparation. [9] R. J. Kochanski and J. L. Paige, \SAFENET { The standard and its appication", IEEE LCS, Vo. 2, No. 1., pp , Feb [10] D. Logothetis and K. Trivedi, \Reiabiity anaysis of various station attachment schemes in a FDDI token ring", [11] U.S. Department of Defense. \Survivabe Adaptabe Fiber Optic Embedded Network ", Sept MIL-STD-2204 [12] G. Nguyen, \Reiabiity anaysis for FDDI dua homing networks", Proc. of 18th Conf. on Loca Computer Networks, [13] K. B. Ochetree, \Using redundancy in FDDI networks," Proc. IEEE Conf. on Loca Computer Networks, pp , [14] Lt. J. L. Paige, \SAFENET - A navy approach to computer networking", Proc. IEEE Conf. on Loca Computer Networks, pp , Minneapois MN, Sept Oct. 3, [15] S. Raph, O. Ukrainsky, R. Scheack, and L. Weinberg, \Aternate path FDDI topoogy ", Proc. IEEE Conf. on Loca Computer Networks, pp , Sept [16] F. E. Ross, \An overview of FDDI: The Fiber Distributed Data Interface", IEEE Journa on Se. Areas in Comm., Vo. 7, Sept [17] SAE, Aerospace Systems Division, Committee AS-2, \Linear Token-passing Mutipe Data Bus", AS4074.1, Version 4.0, [18] SAE, Aerospace Systems Division, Committee AS-2, \High Speed Ring Bus (HSRB)", AS4074.2, Jan. 27, [19] R. W. Uhhorn, \The Fiber-Optic High-Speed Data Bus for a new generation of miitary aircraft", IEEE LCS, Vo. 2, No. 1, Feb [20] R. Wikov, \Anaysis and design of reiabe computer networks", IEEE Transactions on Communications, Vo. COM-20, pp , June
21 [21] Y. Y. Yang and R. Sankar, \Automatic faiure isoation and reconguration", IEEE Network, Vo. 7, No. 5, pp , Sept
Distribution of Path Durations in Mobile Ad-Hoc Networks and Path Selection
Distribution of ath Durations in Mobie Ad-Hoc Networks and ath Seection Richard J. La and Yijie Han Abstract We investigate the issue of path seection in mutihop wireess networks with the goa of identifying
More informationAvailability Analysis for Elastic Optical Networks with Multi-path Virtual Concatenation Technique
Progress In Eectromagnetics Research Symposium Proceedings, Guangzhou, China, Aug. 25 28, 2014 849 Avaiabiity Anaysis for Eastic Optica Networks with Muti-path Virtua Concatenation Technique Xiaoing Wang
More informationAN Ω(D log(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS
SIAM J. COMPUT. c 1998 Society for Industria and Appied Mathematics Vo. 27, No. 3, pp. 702 712, June 1998 008 AN Ω(D og(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS EYAL KUSHILEVITZ AND YISHAY MANSOUR
More informationOpenStax-CNX module: m Inductance. OpenStax College. Abstract
OpenStax-CNX modue: m42420 1 Inductance OpenStax Coege This work is produced by OpenStax-CNX and icensed under the Creative Commons Attribution License 3.0 Cacuate the inductance of an inductor. Cacuate
More informationJoint Optimization of Scheduling and Power Control in Wireless Networks: Multi-Dimensional Modeling and Decomposition
This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Citation information: DOI 10.1109/TMC.2018.2861859,
More informationGRAY CODE FOR GENERATING TREE OF PERMUTATION WITH THREE CYCLES
VO. 10, NO. 18, OCTOBER 2015 ISSN 1819-6608 GRAY CODE FOR GENERATING TREE OF PERMUTATION WITH THREE CYCES Henny Widowati 1, Suistyo Puspitodjati 2 and Djati Kerami 1 Department of System Information, Facuty
More informationRateless Codes for the Gaussian Multiple Access Channel
Rateess Codes for the Gaussian Mutipe Access Channe Urs Niesen Emai: uniesen@mitedu Uri Erez Dept EE, Te Aviv University Te Aviv, Israe Emai: uri@engtauaci Devavrat Shah Emai: devavrat@mitedu Gregory W
More informationPerformance Measures of a UWB Multiple-Access System: DS/CDMA versus TH/PPM
Performance Measures of a UWB Mutipe-Access System: DS/CDMA versus TH/PPM Aravind Kaias and John A. Gubner Dept. of Eectrica Engineering University of Wisconsin-Madison Madison, WI 53706 akaias@wisc.edu,
More informationNEW RISK ANALYSIS METHOD to EVALUATE BCP of SUPPLY CHAIN DEPENDENT ENTERPRISE
The 14 th Word Conference on Earthquake Engineering NEW RISK ANALYSIS ETHOD to EVALUATE BCP of SUPPLY CHAIN DEPENDENT ENTERPRISE Satoru Nishikawa 1, Sei ichiro Fukushima 2 and Harumi Yashiro 3 ABSTRACT
More informationJoint Spectrum Access and Pricing in Cognitive Radio Networks with Elastic Traffic
Joint Spectrum Access and Pricing in Cognitive Radio Networks with Eastic Traffic Joceyne Eias University of Bergamo E-mai: joceyne.eias@unibg.it Fabio Martignon University of Bergamo E-mai: fabio.martignon@unibg.it
More informationAn Evaluation of Connectivity in Mobile Wireless Ad Hoc Networks
An Evauation of Connectivity in Mobie Wireess Ad Hoc Networks Paoo Santi Istituto di Informatica e Teematica Area dea Ricerca de CNR Via G.Moruzzi, 5624 Pisa Itay santi@iit.cnr.it Dougas M. Bough Schoo
More informationRadial basis function networks for fast contingency ranking
Eectrica Power and Energy Systems 24 2002) 387±395 www.esevier.com/ocate/ijepes Radia basis function networks for fast contingency ranking D. Devaraj a, *, B. Yegnanarayana b, K. Ramar a a Department of
More informationPower Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks
roceedings of the 46th IEEE Conference on Decision and Contro New Oreans, LA, USA, Dec. 12-14, 27 FrB2.5 ower Contro and Transmission Scheduing for Network Utiity Maximization in Wireess Networks Min Cao,
More informationJoint Optimal Power Allocation and Relay Selection with Spatial Diversity in Wireless Relay Networks
Proceedings of SDR'11-WInnComm-Europe, 22-24 Jun 2011 Joint Optima Power Aocation and Reay Seection with Spatia Diversity in Wireess Reay Networks Md Habibu Isam 1, Zbigniew Dziong 1, Kazem Sohraby 2,
More informationEnergy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks
Energy-Aware Scheduing with Quaity of Surveiance Guarantee in Wireess Sensor Networks Jaehoon Jeong, Sarah Sharafkandi, and David H.C. Du Dept. of Computer Science and Engineering, University of Minnesota
More informationUtility-Proportional Fairness in Wireless Networks
IEEE rd Internationa Symposium on Persona, Indoor and Mobie Radio Communications - (PIMRC) Utiity-Proportiona Fairness in Wireess Networks G. Tychogiorgos, A. Gkeias and K. K. Leung Eectrica and Eectronic
More informationWireless Communications
Wireess Communications Ceuar Concept Hamid Bahrami Reference: Rappaport Chap3 Eectrica & Computer Engineering Statements of Probems Soving the probem of Spectra congestion System Capacity A system-eve
More informationCO-ORDINATE POSITION OF SENSOR IN MASS OF CUTTING TOOL
XIV Internationa PhD Worshop OWD 00 3 October 0 CO-ORDINATE POSITION OF SENSOR IN MASS OF CUTTING TOOL G. Tymchi I. Diorditsa S. Murahovsyy R. Tymchi Nationa Technica University of Uraine "Kiev Poytechnic
More informationA Low Complexity VCS Method for PAPR Reduction in Multicarrier Code Division Multiple Access
0 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA, VOL. 5, NO., JUNE 007 A Low Compexity VCS Method for PAPR Reduction in Muticarrier Code Division Mutipe Access Si-Si Liu, Yue iao, Qing-Song Wen,
More informationOptimum Fault Current Limiter Placement
Optimum aut urrent Limiter acement Jen-Hao Teng han-an Lu Abstract: Due to the difficuty in power network reinforcement and the interconnection of more distributed generations, faut current eve has become
More informationADAPTIVE ITERATION SCHEME OF TURBO CODE USING HYSTERESIS CONTROL
ADATIV ITRATION SCHM OF TURBO COD USING HYSTRSIS CONTROL Chih-Hao WU, Kenichi ITO, Yung-Liang HUANG, Takuro SATO Received October 9, 4 Turbo code, because of its remarkabe coding performance, wi be popuar
More informationImproving the Active Power Filter Performance with a Prediction Based Reference Generation
Improving the Active Power Fiter Performance with a Prediction Based Reference Generation M. Routimo, M. Sao and H. Tuusa Abstract In this paper a current reference generation method for a votage source
More informationDevelopment of a LabVIEW-based test facility for standalone PV systems
Deveopment of a LabVIEW-based test faciity for standaone PV systems Aex See Kok Bin, Shen Weixiang, Ong Kok Seng, Saravanan Ramanathan and Low I-Wern Monash University Maaysia, Schoo of Engineering No.2,
More informationFuzzy Logic System for Opportunistic Spectrum Access using Cognitive Radio
IJCSI Internationa Journa of Computer Science Issues, Vo. 10, Issue 1, No 1, January 2013 ISSN (Print): 1694-0784 ISSN (Onine): 1694-0814 www.ijcsi.org 703 uzzy Logic System for Opportunistic Spectrum
More informationResource Allocation via Linear Programming for Multi-Source, Multi-Relay Wireless Networks
Resource Aocation via Linear Programming for Muti-Source, Muti-Reay Wireess Networs Nariman Farsad and Andrew W Ecford Dept of Computer Science and Engineering, Yor University 4700 Keee Street, Toronto,
More informationRate-Allocation Strategies for Closed-Loop MIMO-OFDM
Rate-Aocation Strategies for Cosed-Loop MIMO-OFDM Joon Hyun Sung and John R. Barry Schoo of Eectrica and Computer Engineering Georgia Institute of Technoogy, Atanta, Georgia 30332 0250, USA Emai: {jhsung,barry}@ece.gatech.edu
More informationUnderstanding The HA2500 Horizontal Output Load Test
Understanding The HA2500 Horizonta Output Load Test Horizonta output stages are part of every CRT video dispay incuding cosed circuit monitors, computer monitors, video games, medica monitors, TVs. HDTVs,
More informationSecure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits
Secure Physica Layer Key Generation Schemes: Performance and Information Theoretic Limits Jon Waace Schoo of Engineering and Science Jacobs University Bremen, Campus Ring, 879 Bremen, Germany Phone: +9
More informationCooperative Caching in Dynamic Shared Spectrum Networks
Fina version appears in IEEE Trans. on Wireess Communications, 206. Cooperative Caching in Dynamic Shared Spectrum Networs Dibaar Das, Student Member, IEEE, and Ahussein A. Abouzeid, Senior Member, IEEE
More informationRun to Potential: Sweep Coverage in Wireless Sensor Networks
Run to Potentia: Sweep Coverage in Wireess Sensor Networks Min Xi,KuiWu,Yong Qi,Jizhong Zhao, Yunhao Liu,MoLi Department of Computer Science, Xi an Jiaotong University, China Department of Computer Science,
More informationCoordination Improvement of Directional Overcurrent Relays in a Microgrid Using Modified Particle Swarm Optimization Algorithm
Internationa Journa of Eectrica Components and Energy Conversion 2018; 4(1): 21-32 http://www.sciencepubishinggroup.com/j/ijecec doi: 10.11648/j.ijecec.20180401.13 ISSN: 2469-8040 (Print); ISSN: 2469-8059
More informationDESIGN OF A DIPOLE ANTENNA USING COMPUTER SIMULATION
Undergraduate Research Opportunity Project (UROP ) DESIGN OF A DIPOLE ANTENNA USING COMPUTER SIMULATION Student: Nguyen, Tran Thanh Binh Schoo of Eectrica & Eectronic Engineering Nayang Technoogica University
More informationSatellite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic
Sateite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic Jing Zhu and Sumit Roy Department of Eectrica Engineering, University of Washington Box 352500, Seatte, WA 98195, USA
More informationPulsed RF Signals & Frequency Hoppers Using Real Time Spectrum Analysis
Pused RF Signas & Frequency Hoppers Using Rea Time Spectrum Anaysis 1 James Berry Rohde & Schwarz Pused Rea Time and Anaysis Frequency Seminar Hopper Agenda Pused Signas & Frequency Hoppers Characteristics
More informationModel of Neuro-Fuzzy Prediction of Confirmation Timeout in a Mobile Ad Hoc Network
Mode of Neuro-Fuzzy Prediction of Confirmation Timeout in a Mobie Ad Hoc Network Igor Konstantinov, Kostiantyn Poshchykov, Sergej Lazarev, and Oha Poshchykova Begorod State University, Pobeda Street 85,
More informationMinimizing Distribution Cost of Distributed Neural Networks in Wireless Sensor Networks
1 Minimizing Distribution Cost of Distributed Neura Networks in Wireess Sensor Networks Peng Guan and Xiaoin Li Scaabe Software Systems Laboratory, Department of Computer Science Okahoma State University,
More informationDistributed Resource Allocation for Relay-Aided Device-to-Device Communication Under Channel Uncertainties: A Stable Matching Approach
Distributed Resource Aocation for Reay-Aided Device-to-Device Communication Under Channe Uncertainties: A Stabe Matching Approach Monowar Hasan, Student Member, IEEE, and Ekram Hossain, Feow, IEEE Abstract
More informationWorst case delay analysis for a wireless point-to-point transmission
Worst case deay anaysis for a wireess point-to-point transmission Katia Jaffrès-Runser University of Tououse IRIT - INPT ENSEEIHT Tououse, France Emai: katia.jaffres-runser@irit.fr Abstract Wireess technoogies
More informationCapacity of Data Collection in Arbitrary Wireless Sensor Networks
This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. 1 Capacity of Data Coection in Arbitrary Wireess
More informationarxiv: v1 [cs.it] 22 Aug 2007
Voice Service Support in Mobie Ad Hoc Networks Hai Jiang, Ping Wang, H. Vincent Poor, and Weihua Zhuang Dept. of Eec. & Comp. Eng., University of Aberta, Canada, hai.jiang@ece.uaberta.ca Dept. of Eec.
More informationPower Spectrum Optimization for Interference Mitigation via Iterative Function Evaluation
Power Spectrum Optimization for Interference Mitigation via Iterative Function Evauation Hayssam Dahrouj, Wei Yu, Taiwen Tang, and Steve Beaudin Eectrica and Computer Engineering Dept., University of Toronto,
More informationan ampier and a transmitter. P sat is the interna saturation power of the optica ampier. G max is the maximum sma-signa gain of the optica ampier. The
Optimizing Ampier Pacements in a Muti-Waveength Optica LAN/MAN: The Unequay-Powered-Waveengths Case Byrav Ramamurthy, Jason Iness, and Biswanath Mukherjee Abstract Optica networks based on passive-star
More informationCAN FD system design
icc 215 CAN FD system design Dr. - Ing. M. Schreiner Daimer Research and Deveopment Abstract The objective of this paper is to give genera design rues for the physica ayer of CAN FD networks. As an introduction
More informationTHE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN
THE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN A CDMA SYSTEM Yan Zhang, Laurence B. Mistein, and Pau H. Siege Department of ECE, University of Caifornia, San Diego
More informationFast Hybrid DFT/DCT Architecture for OFDM in Cognitive Radio System
Fast Hybrid DF/D Architecture for OFDM in ognitive Radio System Zhu hen, Moon Ho Lee, Senior Member, EEE, hang Joo Kim 3 nstitute of nformation&ommunication, honbuk ationa University, Jeonju, 56-756,Korea
More informationIterative Transceiver Design for Opportunistic Interference Alignment in MIMO Interfering Multiple-Access Channels
Journa of Communications Vo. 0 No. February 0 Iterative Transceiver Design for Opportunistic Interference Aignment in MIMO Interfering Mutipe-Access Channes Weipeng Jiang ai Niu and Zhiqiang e Schoo of
More informationFAULT-TOLERANT AND REAL-TIME WIRELESS SENSOR NETWORK FOR CONTROL SYSTEM
FAULT-TOLERANT AND REAL-TIME WIRELESS SENSOR NETWORK FOR CONTROL SYSTEM by Wenchen Wang Bacheor of Engineering, Northeastern University, China 2013 M.S. in Computer Science, University of Pittsburgh, 2017
More informationP H O T O CD I N F O R M A T I O N B U L L E T I N
PCD 077 Juy, 1994 Copyright, Eastman Kodak Company, 1994 P H O T O CD I N F O R M A T I O N B U L L E T I N Fuy Utiizing Photo CD Images Maintaining Coor Consistency When Creating KODAK Photo CD Portfoio
More informationPerformance Comparison of Cyclo-stationary Detectors with Matched Filter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 2
ISSN 319-8885 Vo.3,Issue.39 November-14, Pages:7859-7863 www.ijsetr.com Performance Comparison of Cyco-stationary Detectors with Matched Fiter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 1 PG Schoar,
More informationarxiv: v4 [physics.soc-ph] 31 Dec 2013
A Cascading Faiure Mode by Quantifying Interactions Junjian Qi and Shengwei Mei Department of Eectrica Engineering, Tsinghua University, Beijing, China 100084 arxiv:1301.2055v4 [physics.soc-ph] 31 Dec
More informationDealing with Link Blockage in mmwave Networks: D2D Relaying or Multi-beam Reflection?
Deaing with Lin Bocage in mmwave etwors: DD Reaying or Muti-beam Refection? Mingjie Feng, Shiwen Mao Dept. Eectrica & Computer Engineering Auburn University, Auburn, AL 36849-5, U.S.A. Tao Jiang Schoo
More informationBER Performance Analysis of Cognitive Radio Physical Layer over Rayleigh fading Channel
Internationa Journa of Computer ppications (0975 8887) Voume 5 No.11, Juy 011 BER Performance naysis of Cognitive Radio Physica Layer over Rayeigh fading mandeep Kaur Virk Dr. B R mbedkar Nationa Institute
More informationl ARRANGE A SECOND PLURALITY OF Z-A STAGES TO PROVIDE A SECOND ADC CHANNEL m
USOO8922411B2 (12) United States Patent (10) Patent No.: Umann et a. (45) Date of Patent: Dec. 30, 2014 (54) CONFIGURABLE HARDWARE-SHARING USPC..... 341/143; 341/120; 341/155 MULTI-CHANNEL ADC (58) Fied
More informationFOR energy limited data networks, e.g., sensor networks,
578 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO., DECEMBER 009 An Optima Power Aocation Scheme for the STC Hybrid ARQ over Energy Limited Networks Hongbo Liu, Member, IEEE, Leonid Razoumov,
More informationSCHEDULING the wireless links and controlling their
3738 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 7, JULY 2014 Minimum Length Scheduing With Packet Traffic Demands in Wireess Ad Hoc Networks Yacin Sadi, Member, IEEE, and Sinem Coeri Ergen,
More informationUniversity of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /GLOCOM.2003.
Coon, J., Siew, J., Beach, MA., Nix, AR., Armour, SMD., & McGeehan, JP. (3). A comparison of MIMO-OFDM and MIMO-SCFDE in WLAN environments. In Goba Teecommunications Conference, 3 (Gobecom 3) (Vo. 6, pp.
More informationNetwork Control by Bayesian Broadcast
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. IT-33, NO. 3, MAY 1987 323 Network Contro by Bayesian Broadcast RONALD L. RIVEST Abstract-A transmission contro strategy is described for sotted- ALOHA-type
More informationA Distributed Utility Max-Min Flow Control Algorithm
A Distributed tiity Max-Min Fow Contro Agorithm Hyang-Won Lee and Song Chong Department of Eectrica Engineering and Computer Science Korea Advanced Institute of Science and Technoogy (KAIST) mshw@netsys.kaist.ac.kr,
More informationLBI Mobile Communications. EDACS TM Jessica. PBX Gateway. Operator s Manual
Mobie Communications EDACS TM Jessica PBX Gateway Operator s Manua TABLE OF CONTENTS 1. SCOPE... 3 2. QUICK USAGE GUIDE... 4 2.1. Making Phone Cas From An EDACS Radio... 4 2.2. Caing EDACS Radios From
More informationBest Relay Selection Using SNR and Interference Quotient for Underlay Cognitive Networks
IEEE ICC 1 - Wireess Communications Symposium Best Reay Seection Using SNR and Interference Quotient for Underay Cognitive Networks Syed Imtiaz Hussain 1, Mohamed M. Abdaah 1, Mohamed-Sim Aouini 1,, Mazen
More informationSURGE ARRESTERS FOR CABLE SHEATH PREVENTING POWER LOSSES IN M.V. NETWORKS
SURGE ARRESTERS FOR CABLE SHEATH PREVENTING POWER LOSSES IN M.V. NETWORKS A. Heiß Energie-AG (EAM), Kasse G. Bazer Darmstadt University of Technoogy O. Schmitt ABB Caor Emag Schatanagen, Mannheim B. Richter
More informationAn Approach to use Cooperative Car Data in Dynamic OD Matrix
An Approach to use Cooperative Car Data in Dynamic OD Matrix Estimation L. Montero and J. Barceó Department of Statistics and Operations Research Universitat Poitècnica de Cataunya UPC-Barceona Tech Abstract.
More informationInformation Theoretic Radar Waveform Design for Multiple Targets
1 Information Theoretic Radar Waveform Design for Mutipe Targets Amir Leshem and Arye Nehorai Abstract In this paper we use information theoretic approach to design radar waveforms suitabe for simutaneousy
More informationOn optimizing low SNR wireless networks using network coding
On optimizing ow SNR wireess networks using network coding Mohit Thakur Institute for communications engineering, Technische Universität München, 80290, München, Germany. Emai: mohit.thakur@tum.de Murie
More informationChannel Division Multiple Access Based on High UWB Channel Temporal Resolution
Channe Division Mutipe Access Based on High UWB Channe Tempora Resoution Rau L. de Lacerda Neto, Aawatif Menouni Hayar and Mérouane Debbah Institut Eurecom B.P. 93 694 Sophia-Antipois Cedex - France Emai:
More informationNon-Preemptive Interrupt Scheduling for Safe Reuse of Legacy Drivers in Real-Time Systems
Non-Preemptive Interrupt Scheduing for Safe Reuse of Legacy Drivers in Rea-Time Systems Tuio Facchinetti, Giorgio Buttazzo, Mauro Marinoni, and Giacomo Guidi University of Pavia, Itay {tuio.facchinetti,giorgio.buttazzo,
More informationEffect of Interfering Users on the Modulation Order and Code Rate for UWB Impulse-Radio Bit-Interleaved Coded M-ary PPM
Effect of Interfering Users on the Moduation Order and Code Rate for UWB Impuse-Radio Bit-Intereaved Coded M-ary PPM Ruben Merz and Jean-Yves Le Boudec EPFL, Schoo of Computer and Communication Sciences
More informationConfiguring RolandVersaWorks to print on your HEXIS media
PRINTING DIVISION Product Buetin N 4 Configuring RoandVersaWorks to print on your HEXIS media 1. Instaing a media profie suitabe for your HEXIS printing media 1.1. Downoading the media profie 2 1.2. Importing
More informationComputer Science Clinic Overview
Harvey Mudd Coege Computer Science Department Computer Science Cinic Overview Robert M. Keer Professor & Director www.cs.hmc hmc.edu/cinic keer@cs.hmc hmc.edu 909-621-8483 History of Computer Science Cinic
More informationResource Allocation for Network-Integrated Device-to-Device Communications Using Smart Relays
Resource Aocation for Network-Integrated Device-to-Device Communications Using Smart Reays Monowar Hasan and Ekram Hossain Department of Eectrica and Computer Engineering, University of Manitoba, Winnipeg,
More informationMarketing tips and templates
For financia adviser use ony. Not approved for use with customers. Marketing tips and tempates Heping you to grow your equity reease business The growing equity reease market can offer many opportunities
More informationOn the Relationship Between Queuing Delay and Spatial Degrees of Freedom in a MIMO Multiple Access Channel
On the Reationship Between Queuing Deay and Spatia Degrees of Freedom in a IO utipe Access Channe Sriram N. Kizhakkemadam, Dinesh Rajan, andyam Srinath Dept. of Eectrica Engineering Southern ethodist University
More informationEnergy Efficient Sensor, Relay and Base Station Placements for Coverage, Connectivity and Routing
Energy Efficient Sensor, Reay and Base Station Pacements for Coverage, Connectivity and Routing Mauin Pate*, R. Chandrasekaran and S.Venkatesan Teecommunication Engineering Program Erik Jonsson Schoo of
More informationRESEARCH OF UHV CIRCUIT BREAKER TRANSIENT RECOVERY VOLTAGE CHARACTERISTIC
.P.B. Sci. Bu., Series C, Vo. 79, Iss. 3, 217 ISSN 2286-354 RESEARCH OF HV CIRCIT BREAKER TRANSIENT RECOVERY VOLTAGE CHARACTERISTIC Baina HE 1, Yunwei HAO 2 The most critica transient a circuit breaker
More informationJoint Congestion Control, Routing and Media Access Control Optimization via Dual Decomposition for Ad Hoc Wireless Networks
Joint Congestion Contro, Routing and Media Access Contro Optimization via Dua Decomposition for Ad Hoc Wireess Networks Francesco Lo Presti Dipartimento di Informatica Università de L Aquia opresti@di.univaq.it
More informationDESIGN OF SHIP CONTROLLER AND SHIP MODEL BASED ON NEURAL NETWORK IDENTIFICATION STRUCTURES
DESIGN OF SHIP CONROLLER AND SHIP MODEL BASED ON NEURAL NEWORK IDENIFICAION SRUCURES JASMIN VELAGIC, FACULY OF ELECRICAL ENGINEERING SARAJEVO, BOSNIA AND HERZEGOVINA, asmin.veagic@etf.unsa.ba ABSRAC his
More informationJoint Beamforming and Power Optimization with Iterative User Clustering for MISO-NOMA Systems
This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Citation information: DOI 0.09/ACCESS.07.70008,
More informationOn the Relationship Between Capacity and Distance in an Underwater Acoustic Communication Channel
On the Reationship Between Capacity and Distance in an Underwater Acoustic Communication Channe Miica Stojanovic Massachusetts Institute of Technoogy miitsa@mit.edu ABSTRACT Path oss of an underwater acoustic
More informationTime-domain Techniques in EMI Measuring Receivers. Technical and Standardization Requirements
Time-domain Techniques in EMI Measuring Receivers Technica and Standardization Requirements CISPR = Huge, Sow, Compex, CISPR = Internationa Specia Committee on Radio Interference Technica committee within
More informationA Comparative Analysis of Image Fusion Techniques for Remote Sensed Images
roceedings of the Word Congress on Engineering 27 Vo I WCE 27, Juy 2-4, 27, London, U.K. Comparative naysis of Image Fusion Techniques for emote Sensed Images sha Das 1 and K.evathy 2 Department of Computer
More informationEffect of Estimation Error on Adaptive L-MRC Receiver over Nakagami-m Fading Channels
Internationa Journa of Appied Engineering Research ISSN 973-456 Voume 3, Number 5 (8) pp. 77-83 Research India Pubications. http://www.ripubication.com Effect of Estimation Error on Adaptive -MRC Receiver
More informationMulticast Routing Algorithms for Sparse Splitting Optical Networks 1
Muticast Routing Agorithms for Sparse Spitting Optica Networks 1 Presenter: Aniang Cai PhD candidate, Department of Eectronic Engineering, City University of Hong Kong, Hong Kong SAR Emai: caianiang@outook.com
More informationConfiguring Onyx to print on your HEXIS media
Configuring Onyx to print on your HEXIS media 1. Instaing a media profie suitabe for your HEXIS printing media 1.1. Downoading the media profie 2 1.2. Importing the media profie into Onyx 3 2. Defaut setting
More informationCross-layer queuing analysis on multihop relaying networks with adaptive modulation and coding K. Zheng 1 Y. Wang 1 L. Lei 2 W.
www.ietd.org Pubished in IET Communications Received on 18th June 2009 Revised on 30th Juy 2009 ISSN 1751-8628 Cross-ayer queuing anaysis on mutihop reaying networks with adaptive moduation and coding
More informationSpatial Reuse in Dense Wireless Areas: A Cross-layer Optimization Approach via ADMM
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Spatia Reuse in Dense Wireess Areas: A Cross-ayer Optimization Approach via ADMM Haeh Tabrizi, Member, IEEE, Borja Peeato, Member, IEEE, Gonaz Farhadi, Member,
More informationNew Image Restoration Method Based on Multiple Aperture Defocus Images for Microscopic Images
Sensors & Transducers, Vo. 79, Issue 9, September 204, pp. 62-67 Sensors & Transducers 204 by IFSA Pubishing, S. L. http://www.sensorsporta.com New Image Restoration Method Based on Mutipe Aperture Defocus
More informationSTUDY ON AOTF-BASED NEAR-INFRARED SPECTROSCOPY ANALYSIS SYSTEM OF FARM PRODUCE QUALITY
STUDY ON AOTF-BASED NEAR-INFRARED SPECTROSCOPY ANALYSIS SYSTEM OF FARM PRODUCE QUALITY Xiaochao Zhang *, Xiaoan Hu, Yinqiao Zhang, Hui Wang, Hui Zhang 1 Institute of Mechatronics Technoogy and Appication,
More informationSpatial Characteristics of 3D MIMO Wideband Channel in Indoor Hotspot Scenario at 3.5 GHz
Spatia Characteristics of 3D MIMO Wideband Channe in Indoor Hotspot Scenario at 3.5 GHz ei Tian Jianhua Zhang Yuxiang Zhang State Key ab. of Networking and Switching Tech. Beijing Univ. of osts and Teecom.
More informationAnalysis, Analysis Practices, and Implications for Modeling and Simulation
, Practices, and Impications for Modeing and imuation Amy Henninger The Probem The act of identifying, enumerating, evauating, and mapping known technoogies to inferred program requirements is an important
More informationSeries 700A Power Processor
Series 700A Power Processor 5 25 SINGLE PHASE 10 500 THREE PHASE VOLTAGE REGULATION, ISOLATION, AND POWER DISTRIBUTION FOR CLEAN, SPIKE-FREE, STABLE VOLTAGE When Power Quaity Is A Must And Faiure Is Not
More informationAn Optimization Framework for XOR-Assisted Cooperative Relaying in Cellular Networks
n Optimization Framework for XOR-ssisted Cooperative Reaying in Ceuar Networks Hong Xu, Student Member, IEEE, Baochun Li, Senior Member, IEEE bstract This work seeks to address two questions in cooperative
More informationShort Notes Lg Q in the Eastern Tibetan Plateau
Buetin of the Seismoogica Society of America, Vo. 92, No. 2, pp. 87 876, March 2002 Short Notes Q in the Eastern Tibetan Pateau by Jiakang Xie Abstract spectra are coected from the 99 992 Tibetan Pateau
More informationComparison of One- and Two-Way Slab Minimum Thickness Provisions in Building Codes and Standards
ACI STRUCTURAL JOURNAL Tite no. 107-S15 TECHNICAL PAPER Comparison of One- and Two-Way Sab Minimum Thickness Provisions in Buiding Codes and Standards by Young Hak Lee and Andrew Scanon Minimum thickness
More informationAn Exact Algorithm for Power Grid Interdiction Problem with Line Switching
1 An Exact Agorithm for Power Grid Interdiction Probem with Line Switching Long Zhao, Student Member, IEEE, and Bo Zeng, Member, IEEE, Abstract Power grid vunerabiity anaysis is often performed through
More informationProbabilistic Scheduling Guarantees under Error Bursts in Controller Area Network (CAN)
Probabiistic Scheduing Guarantees under Error Bursts in Controer Area Network (CAN) Hüseyin Aysan, Radu Dobrin, and Sasikumar Punnekkat äardaen Rea-Time Research Centre, äardaen University, Västerås, Sweden
More informationTHE EMERGING IEEE ad wireless local area
1 Suboptima Spatia Diversity Scheme for 60 Gz Miimeter-Wave WLAN Zhenyu Xiao, Member, IEEE arxiv:1511.02326v1 [cs.it] 7 Nov 2015 Abstract This etter revisits the equa-gain (EG) spatia diversity technique,
More informationCOMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS
COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE80.15.3A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS Ms. Jina H. She PG Student C.C.E.T, Wadhwan, Gujarat, Jina_hshet@yahoo.com Dr. K. H. Wandra Director
More information(12) United States Patent (10) Patent N0.: US 6,493,200 B1 Farmer et al. (45) Date of Patent: Dec. 10, 2002
i US006493200B1 (12) United States Patent (10) Patent N0.: US 6,493,200 B1 Farmer et a. (45) Date of Patent: Dec. 10, 2002 (54) COAXAL CABLE PROTECTON DEVCE Primary Examiner EdWard H. Tso _ Assistant Examiner
More informationLIGHTNING PROTECTION OF MEDIUM VOLTAGE OVERHEAD LINES WITH COVERED CONDUCTORS BY ANTENNA-TYPE LONG FLASHOVER ARRESTERS
C I R E D 17 th Internationa Conference on Eectricity Distribution Barceona, 12-15 May 23 LIGHTNING PROTECTION OF MEDIUM VOLTAGE OVERHEAD LINES WITH COVERED CONDUCTORS BY ANTENNA-TYPE LONG FLASHOVER ARRESTERS
More informationOnline, Artificial Intelligence-Based Turbine Generator Diagnostics
AI Magazine Voume 7 Number 4 (1986) ( AAAI) Robert L. Osborne, Ph. D Onine, Artificia Inteigence-Based Turbine Generator Diagnostics introduction The need for onine diagnostics in the eectric powergeneration
More information