Changing the routing protocol without transient loops

Size: px
Start display at page:

Download "Changing the routing protocol without transient loops"

Transcription

1 Chnging the routing protool without trnsient loops Nny Rhkiy, Alexnre Guitton To ite this version: Nny Rhkiy, Alexnre Guitton. Chnging the routing protool without trnsient loops. Computer Communitions, Elsevier, 2016, 82, pp < /j.omom >. <hl > HAL I: hl Sumitte on 27 Jn 2017 HAL is multi-isiplinry open ess rhive for the eposit n issemintion of sientifi reserh ouments, whether they re pulishe or not. The ouments my ome from tehing n reserh institutions in Frne or ro, or from puli or privte reserh enters. L rhive ouverte pluriisiplinire HAL, est estinée u épôt et à l iffusion e ouments sientifiques e niveu reherhe, puliés ou non, émnnt es étlissements enseignement et e reherhe frnçis ou étrngers, es lortoires pulis ou privés.

2 Chnging the Routing Protool without Trnsient Loops Nny El Rhkiy, Alexnre Guitton Clermont Université, Université Blise Psl, LIMOS, BP 10448, F Clermont-Ferrn, Frne CNRS, UMR 6158, LIMOS, F Auière, Frne Astrt Computer networks generlly operte using single routing protool. However, there re situtions where the routing protool hs to e hnge (e.g., euse n upte of the routing protool is ville, or euse n externl event hs triggere trffi with ifferent qulity of servie requirements). In this pper, we show tht n unontrolle hnge of the routing protool might yiel to trnsient routing loops (even if the involve routing protools re loop-free). We show tht it is possile to hieve loop-free hnge for multiple estintions using strongly onnete omponent pproh prouing suessive steps, where eh step ontins noes tht n hnge the routing protool in prllel. Our im is to reue the numer of steps in orer to reue the time require for the network to hnge from one routing protool to nother. Simultion results show tht our strongly onnete omponent pproh gretly reues the numer of steps ompre to the stte of the rt, n thus it gretly reues the time for the hnge. Keywors: Routing protools, routing protool hnge, trnsient routing loops. 1. Introution Computer networks generlly operte single routing protool whih etermines the route pkets hve to follow in orer to reh estintion. However, some situtions require to hnge the urrent routing protool. For exmple, this hnge might e triggere y the vilility of mjor upte of the protool or the orretion of seurity issue [1]. Another exmple onerns monitoring pplitions in wireless sensor networks, where the etetion of ritil event might trigger the hnge from n energy-effiient routing protool to ely-sensitive routing protool [2]. Another exmple fouses on the hnges in routing eisions use y mjor moifitions of the topology(ue to link or noe filures, or to signifint hnges in routing metris) [3, 4, 5]. If noes re urtely synhronize, they n perform the hnge simultneously from the urrent routing protool R 1 to the new routing protool R 2. However, this solution is often iffiult to implement in prtie, espeilly in lrge networks. Inee, the ost of n urte synhroniztion might e prohiitive, or noes might e operte y ifferent network ministrtors, leing to ifferent plnnings for the hnge. We ssume in the following tht noes nnot e synhronize in suh preise mnner. If noes re not synhronize n if noes perform the hnge ritrrily, trnsient routing loops might our, even if the routing protools re loop-free when onsiere inepenently. Figure 1 shows suh n exmple. Initilly, ll pkets towrs re route oring to routing protool R 1, n R 1 is loop-free (see Figure 1()). If noes re requeste to hnge to nother protool R 2 in ritrry orer (R 2 is shown on Figure 1()), it is possile tht hnges first, resulting into the routing epite on Figure 1(). In this se, trnsient routing loop ours etween noes n. This loop will eventully ispper when noe hnges to R 2 too, ut the impt on the network performne is not negligile. Corresponing uthor. Emil Aress: lexnre.guitton@univ-plermont.fr (Alexnre Guitton) Phone: , Fx: Preprint sumitte to Elsevier Ferury 18, 2016

3 R 2 R 1 R 1 () () () Figure 1: Unontrolle hnges might yiel to routing loops. () The initil routing protool R 1 is loop-free for estintion. () The new routing protool R 2 is lso loop-free for estintion. () A loop ours etween noes n, if n route oring to R 1 n routes oring to R 2. R 2 Routing loops reue network performne s they n use noe inessiility issues or overlo the network. Even if the routing loops use y the hnges re trnsient (euse ll noes will eventully perform the hnge to the new, loop-free routing protool), our im is to ompletely voi them, s they might hve signifint impt for the pplitions. In [6], we lssifie routing protools into three tegories: (i) omptile routing protools, whih o not yiel to routing loops when they re use together, (ii) elyle routing protools, where noes might voi loops se on the knowlege of the istne funtions of the two protools, n (iii) omine routing protools, when the istne funtions of the two protools re not known or hr to ompute lolly y the noes. In [7], we use proilisti pproh to voi loops. Inee, some noes hoose rnomly whether to forwr pkets or to hol them. However, the ommon ssumption of [6, 7] is tht routing protools lternte. In this pper, we mke more generl ssumption, where the hnge is finl: one noe hs hnge to R 2, it oes not hnge k to R 1 nymore. This new ssumption mkes the previous solutions inpplile. Moreover, we show tht the hnge to R 2 n e performe in suessive steps, where ll noes of the sme step n perform the hnge ritrrily without using loops. Our ontriution is three-fol. First, we show tht the proility of trnsient loops is high for oth rnom n rel topologies, n for severl types of routing protools pirs. Seon, we improve the min heuristi propose y [8] for networks with severl estintions, y proposing greey mehnism to el with troulesome estintions, n y omputing sequene of steps rther thn sequene of noes. Thir, we propose our entrlize heuristi se on the omputtion of strongly onnete omponents in orer to lssify noes into steps. It is ime t reuing the overll numer of steps n thus reuing the hnge urtion, whih is our min metri. The reminer of the pper is orgnize s follows. Setion 2 esries relevnt reserh works of the literture. Setion 3 first presents two improvements for the min protool of the literture [8]: greey mehnism for the per-estintion orering, n the omputtion of sequene of steps rther thn sequene of noes. Then, it presents our entrl theorem se on strongly onnete omponents. Finlly, it presents our heuristi se on this theorem. Setion 4 evlutes the performne of these heuristis on severl topologies n for severl routing protools pirs. Finlly, Setion 5 onlues this work. 2. Relte work In this setion, we first esrie rhitetures where routing loops might our. Then, we present the solutions from the literture tht voi routing loops ourring uring the hnge from one protool to nother. Then, we esrie in etils the Routing Tree Heuristi (RTH) presente in [8], s it is the min heuristi to hnge routing protools. Finlly, we esrie the min ifferenes etween RTH [8] n this pper Networks n protools with risks of loop ourrene Severl routing protools tht omine ifferent routing eisions hve een propose in the literture. In[9], the uthors propose to omine retive routing protool with greey geogrphil routing protool. When pket hs to e forwre, the retive protool estlishes the whole route to the estintion. The 2

4 geogrphil protool is use when the next-hop oring to the retive protool eomes unrehle. Routing loops n our if the geogrphil protool forwrs pkets to noe tht uses the retive protool. In [10], routing protool R tht reues ely is omine with routing protool R e tht reues energy. R n R e re use epening on the trffi proue y the pplition: urgent pkets re forwre oring to R, while perioi pkets re forwre oring to R e. Routing loops n our if n urgent pket rehes noe tht hs limite energy n uses R e. In [11], pkets re given priority se on trffi type. The next-hop of pket is ompute oring to severl prmeters, inluing pket priority, numer of hops to the estintion, link qulity for the next-hop, resiul energy for the next-hop, lo of the next-hop, et. Routing loops n our if the prmeters use y noe re ifferent from the prmeters use y nother noe on the pth to the estintion. Multi-purpose Wireless Sensor Networks (WSNs) [12] hve een propose to enle single WSN eployment to support severl pplitions. The min vntge of multi-purpose WSNs is tht the ost of eployment is shre y ll the pplitions. Severl reserhers hve propose protools for multi-purpose WSNs [13, 14, 15, 16]. In suh networks, severl routing protools n e use simultneously, euse the lrge mount of pplitions yiel to ifferent requirements tht nnot e met y single routing protool. However, eling with severl routing protools might use routing loops when the hoie of the routing protool is me lolly y eh noe [6, 7] Heuristis tht voi routing loops The prolem of voiing trnsient loops uring hnge of routing protools is reent issue. We summrize here the min relte works. In [6, 7], noes re synhronize n forwr pkets oring to sheule ompose of two perios p 1 n p 2. During p 1, noes forwr pkets oring to R 1, n uring p 2, noes forwr pkets oring to R 2. Routing loops n our if noes eome esynhronize or if the eision to forwr pket oring to R 1 or R 2 is me lolly y eh noe, inepenently of the perio. In [6], properties of pirs of routing protools re stuie, n three tegories re ientifie: (i) omptile routing protools, whih o not yiel to routing loops, (ii) elyle routing protools, where noes might voi loops se on the knowlege of the istne funtions of the two protools, n (iii) omine routing protools, where the istne funtions of the two protools re not known or hr to ompute lolly y the noes. The lst two tegories require R 1 n R 2 to lternte, s some noes hol pkets inefinitely for one routing protool. They re not suitle for finl hnge of routing protool, s we onsier in this pper. In [7], two heuristis re propose to voi loops or reue their ourrenes. In the first heuristi, ll loops re voie y foriing some noes to forwr pkets oring to one routing protool R i. In the seon heuristi, proilisti pproh is use to reue the risk of loops: noes tht oul potentilly e involve in loops hoose rnomly whether to forwr or to hol pkets for one routing protool. These two heuristis nnot e pplie here euse the hnge from R 1 to R 2 is finl: one noe hs performe the hnge to R 2, it oes not hnge k to R 1. In[4], the uthors show tht most routing protools n proue trnsient routing loops fter topologil hnge. They show tht suh loops n e voie y hving routers proess routing uptes in speifi orer. Their mehnism is le to el with link filures, new links, or uptes on link metris. The ifferenes with this pper re the following: (i) we onsier ritrry protools for R 1 n R 2, while [4] onsiers single routing protool on two similr topologies, (ii) we reue the numer of steps require for the hnge, while [4] provies n orering of uptes tht oes not use loops, n (iii) in our proposition, eh noe is upte extly one for eh estintion, while the lgorithm of [4] might upte the sme noe severl times. In [3, 5], the uthors show tht orering the routing uptes yiels to itionl messge overhe n inreses the hnge ely. They voi trnsient routing loops y exploiting the existene of one forwring tle per interfe. Messges rriving through unexpete interfes re isre, euse they inite isrepny etween the view of the router n of its neighors. One ll routers hve the sme view of the topology, the protool onverges n proues loop-free routes. The min ifferene with this pper is tht we o not rop pkets uring the hnge to reue the impt of loops, ut we voi hnging the routing protool of noes if it uses loop. 3

5 In [17, 18], the uthors show tht trnsient routing loops tht our fter topologil hnges n e voie y pplying sequene of topology uptes. Between two topology uptes, the sme routing protool is use, ut some link vlues re moifie, whih result into hnges in routing eisions. They propose protool tht minimizes the numer of topology uptes. The ifferene with this pper re the following: (i) we onsier two ifferent routing protools on single topology, while [17, 18] onsier single routing protool pplie on sequene of upte topologies, (ii) we onsier ritrry routing protools, while [17] onsiers hnges on only one link n [18] onsiers hnges onerning the links of single router, n (iii) we reue the numer of steps to perform the hnge, where eh step is set of noes n eh noe ppers extly one per estintion, while [17, 18] ttempts to minimize the numer of topology uptes to gurntee the onvergene of single routing protool without trnsient loops. In [8], the uthorsesrie heuristi whih is se onsimilr ssumptionssin this pper. We esrie this heuristi in etils in the next susetion Routing Tree Heuristi [8] In [8], uthors propose orering lgorithms in orer to voi loops uring the hnge from one routing protool R 1 to nother routing protool R 2. They propose heuristi lle Routing Tree Heuristi (RTH). RTH onsists of the following. For eh estintion, the orering onstrints re ompute seprtely. First, greey lgorithm is use to ompute the set S of noes tht o not yiel to loops in the network. A noe is e to S if n only if its next-hops using R 1 n using R 2 re lrey in S. Seon, the set V of noes is uilt y ing eh noe tht oes not hve the sme next-hops using R 1 n R 2. Thir, RTH uils set of onstrints C in the following wy: for eh pth on R 2 from soure noe to the estintion, onstrint is generte for the lst pir of noes (u,v) on this pth suh tht u V n u / S. In this wy, the hnge from R 1 to R 2 strts from the estintion kwrs (oring to R 2 ) to the soures, whih gurntees tht no loop our on the pth. This mens tht noe n oes not hnge efore ll its suessors on R 2 hve lrey hnge. Finlly, RTH retes n yli irete grph G C from the set of onstrints C, n the orering is ompute s topologil sort of G C Differenes etween RTH n our proposition The ifferenes with this pper re the following: RTH hnges the routing protool of noes one y one, so the urtion of the hnge is proportionl to the numer of noes in the network. However, we show here tht it is possile to hnge the routing protool of severl noes in prllel, without ny loop ourrene. We use this prllelism to reue the time require for the routing protool hnge. RTH hnges the routing protool of noes y following the rs of R 2 from the estintion kwrs to the soures. However, we show tht it is possile to hnge the routing protool for noes inepenently of their position on the pths from soures to estintions oring to R 2. We use strongly onnete omponent pproh to ientify those noes. The uthors of RTH ssume tht there re few troulesome estintions, so RTH tries to ompute the orering for ll estintions together when possile. However, we show tht troulesome estintions re reltively frequent, so we eie to onsier estintions inepenently. 3. Fst hnges of routing protools The min riteri when performing hnges of routing protools without trnsient loops is the overll time requirefor the hnge. We onsierin this pper tht it is possile toperform the hngessequene of steps, where noes of eh steps n hnge their routing protool in prllel. Thus, the time require for the hnge is proportionl to the numer of steps, rther thn to the numer of noes in the network. In this setion, we first esrie improvements to RTH [8]: the first improvement is greey mehnism tht els with troulesome estintions, n the seon improvement enles the support of steps. Seon, we give mthemtil kgroun for prllel steps se on strongly onnete omponents. Thir, we esrie our heuristi se on this kgroun. 4

6 3.1. Improvements of RTH We present here two improvements of RTH. The first improvement esries the per-estintion orering, when per-router orering oes not exist ue to troulesome estintions. The seon improvement esries how to enle prllel hnges in RTH Improvement 1: Greey mehnism of per-estintion orering in RTH The first improvement is greey mehnism of per-estintion orering. Note tht this orering n e pplie when per-router orering exists (in this se, ll estintions n e regroupe, n the result is the sme s with the originl RTH) s well s when per-router orering oes not exist (in this se, severl estintions re regroupe in greey mnner, n troulesome estintions re proesse inepenently). Authors of [8] minly esrie the per-router orering (whih ssumes tht there is no troulesome estintion), n expline tht troulesome estintions n e proesse inepenently from the other estintions. However, they i not propose n lgorithm tht ientifies troulesome estintions, or tht ggregtes non-troulesome estintions(this ws left s future work ue to the ft tht troulesome estintions were limite in their experimentl evlution, f Susetion V.C of [8]). The RTH heuristi (see Figure 8 of [8]) is moifie in the following wy. Initilly, the set of troulesome estintions is initilize to. In the min loop tht onsiers eh estintion, the onstrint grph G C is ompute using V n the set of onstrints C. If the new grph G C, inluing the onstrints generte y ll previous non-troulesome estintions n the new estintion, hs no loop, then the new estintion is onsiere s non-troulesome estintion. However, if the new grph G C hs loop, estintion is e to the list of troulesome estintions, n the onstrints generte from this estintion re remove from C. In this se, moifitions to G C onerning re isre. After ll estintions hve een onsiere, the orering is me first for ll non-troulesome estintions together using G C, n then for ll troulesome estintions one y one, using the per-estintion orering Improvement 2: Prllel hnges in RTH The seon improvement onsists of enling prllel hnges in RTH, in orer to otin sequene of steps rther thn sequene of noes. This moifition n e performe effiiently from the onstrint grph G C ompute for ll non-troulesome estintions (s well s for eh troulesome estintion inepenently). This improvement onsists of hnging the lst step of RTH, y repling the topologil sort of G C with Algorithm 1. In this lgorithm, new set S is e to sequene T t eh itertion. At eh itertion, ll noes tht hve no inoming eges in G C (tht is, no onstrints), re e to the new set S n ll eges leving from these noes re remove from G C. Sine G C hs no loop (ue to the onstrution of ll non-troulesome estintions, n to the ft tht troulesome estintions re onsiere inepenently), the proess ens with ll noes eing in T. In our implementtion, sequene T ontins first the steps for ll non-troulesome estintions, then the steps for eh troulesome estintion suessively. In the following, we enote y RTH-p this heuristi Exmple of RTH-p In the following, we esrie RTH-p in n exmple. This exmple shows our greey mehnism for per-estintion orering, s well s prllel hnges. Figure 2 shows grph of five noes, with three estintions n two routing protools: () estintion with R 1 n R 2, () estintion with R 1 n R 2, n () estintion e with Re 1 n Re 2. When onsiering estintions inepenently, RTH proues the orer (,e,,,) for estintion, (,e,,,) for estintion, n (e,,,, ) for estintion e. When onsiering ll estintions together, our greey mehnism first onsiers estintion, ientifies estintion s troulesome, n ientifies estintion e s non-troulesome. Thus, RTH-p proues sequene ({, e},{},{},{}) for oth non-troulesome estintions n e, n sequene ({,, e},{},{}) for troulesome estintion. The resulting sequene is ({,e},{},{},{},{,,e},{},{}) (to simplify the nottion, we i not inite whih estintion is onerne y the hnge t eh step). Note tht eh noe ppers severl times ut for ifferent estintions. 5

7 Algorithm 1 Prllel hnges in RTH. Require: G C grph of onstrints Ensure: T is sequene of steps T while some noes re not in T o S while noe n G C o if n / S n n / T then if n hs no inoming eges in G C then S S {n} en if en if en while while noe n S o remove from G C ll eges leving from n en while set S to sequene T en while R 1 R 2 R 2 R e 2 R 1 R e 1 e e e () () () Figure 2: Exmple of routing protools for three estintions: () is the estintion, () is the estintion, n () e is the estintion. 6

8 3.2. Prolem formultion for the onstrution of sequene of steps Let V e set of noes n V estintion. Let us onsier two routing protools for estintion : R 1 is the routing protool initilly use y noes, n R 2 is the new protool to use. For ll i {1,2} n for ll n V, we enote y R i (n) V the next-hop of n towrs oring to R i. Given prtition (V 1,V 2 ) of V (i.e., V 1 V 2 = V n V 1 V 2 = ), we enote y R V1,V 2 the routing protool efine in the following wy: for ll n V 1, R V1,V 2 (n) = R 1 (n), n for ll n V 2, R V1,V 2 (n) = R 2 (n). In other wors, noes of V 1 route oring to R 1, n noes of V 2 route oring to R 2. The set of routing eisions of oth R 1 n R 2 form the set E of the eges of the grph G = (V,E). Definition 1 (Loop-free step). Let (V 1,V 2 ) e prtition of noes, n S V 1 set of noes tht hnge their routing protool to R 2 in ritrry orer. S is lle step. Step S is si to e loop-free if n only if for ll S S, the routing protool R V1\S,V 2 S is loop-free. Definition 1 sttes tht step S is loop-free if n only if ll the possile intermeite su-steps S S orrespon to loop-free routing protool. This mens tht the noes of S n hnge their routing protool ritrrily without using loops. Definition 2 (Loop-free sequene). Let T = (S 1,...,S m ) e sequene of steps. Sequene T is si to e loop-free if n only if oth onitions pply: (S 1,S 2,...,S m ) prtitions the set V, for ll i [1;m], S i is loop-free step on prtition (V i 1,V i 2), with V i 2 = S 1... S i 1 n V i 1 = V\V i 2. Definition 2 sttes tht sequene T = (S 1,...,S m ) is loop-free if n only if eh step S i is loop-free, n fter step S m, ll noes elong to V2 m S m = V (tht is, they hve hnge to the trget routing protool R 2 ). Note tht the set of noes running R 2, whih is V2 i, inreses s the sequene progresses. Figure 3 shows n exmple of loop-free sequene T = ({,, },{}). Figure 3() shows the initil routing protool R 1. Figure 3() shows oth R 1 n R 2 for noes of the first step {,,}, to inite tht these noes might route either oring to R 1 (if they hve not hnge yet) or R 2 (if they hve lrey hnge). It n e seen tht for ny routing protool use y the noes of the first step, no loop ours for ny ritrry orer of hnge. Figure 3() shows R 2 for noes tht hve hnge their routing protool on the previous step, n shows oth R 1 n R 2 for the noe of the seon step. On sie note, it n e notie tht T is loop-free sequene with minimum numer of steps, s it is not possile to hve oth n in the sme loop-free step. R 2 R 2 R 1 R 1 R 1 () () () Figure 3: An exmple of loop-free sequene T = ({,,},{}). () Initilly, ll noes route oring to R 1. () During the first step, noes from {,,} might route oring to R 1 or R 2 without using loops. () During the seon step, noe routes oring to R 1 or R 2, while ll noes from {,,} route oring to R 2. At the en of the seon step, ll noes route oring to R 2 (not shown). Theorem 1. Let G, V 1, V 2, R 1 n R 2 e efine s previously for estintion. Let G = (V,E ) with E E, suh tht for ll x V 1, (x,r 1 (x)) E n (x,r 2 (x)) E, n for ll x V 2, (x,r 2 (x)) E. Let C = {C i } i e the set of ll strongly onnete omponents of G. For ll i, let us enote y C i C i set of noes tht verifies the following properties: C i V 1, 7

9 G i = (V,E i ) oes not ontin ny loop, with E i efine s follows: if x C i then (x,r 1(x)) E i n (x,r 2(x)) E i, if x V 1 \C i then (x,r 1(x)) E i, if x V 2 then (x,r 2 (x)) E i. Then, S = i C i is vli step for estintion. Proof. Let us ssume tht {C i } i verifies the properties. We hve to show tht S = i C i is vli step, tht is, for every S S, R V1\S,V 2 S is loop-free n les to estintion. Let S e n ritrry suset of S, n let us uil R V1\S,V. 2 S Let us first show tht R V1\S,V 2 S is loop-free. By ontrition, let us suppose tht there is loop (x 0,x 1,...,x n ) in R V1\S,V, 2 S with x n = x 0. Suppose here tht this loop spns single strongly onnete omponent C i. For ll k, we hve (x k,x k+1 ) E S. (i) If x k S, then x k+1 = R 2 (x k ) y onstrution of E S (sine S S C i ). Beuse of the properties of C i, we hve (x k,r 2 (x k )) E i. (ii) If x k / S n x k V 1, then x k+1 = R 1 (x k ) y onstrution of E S. We hve to onsier the two following su-ses: x k C i n x k / C i. If x k C i, then (x k,r 1 (x k )) E i. If x k / C i, then (x k,r 1 (x k )) E i. (iii) If x k / S n x k V 2, then x k+1 = R 2 (x k ) y onstrution of E S, n x k / C i. Thus, (x k,r 2 (x k )) E i. To summrize these three ses, ll the rs of the loop on E S re lso inlue in the rs of E i, thus G i ontins loop. However, this is impossile y onstrution of C i. Thus, y ontrition, there is no loop on G S. Suppose now tht this loop spns severl strongly onnete omponents, inluing C i n C j, with i j. For ll noes x m of the loop (with (x m,x m+1 ) E S ), let us show tht (x m,x m+1 ) E. (i) If x m S, then x m+1 = R 2 (x m ), n x m C i, whih mens tht x m V 1. Thus, (x m,r 2 (x m )) E y onstrution of E. (ii) If x m / S n x m V 1, then x m+1 = R 1 (x m ). Thus, (x m,x m+1 ) E. (iii) If x m / S n x m V 2, then x m+1 = R 2 (x m ). Thus, (x m,x m+1 ) E. To summrize these three ses, for ll x m of the loop, (x m,x m+1 ) E, so there exists loop in G etween noe of C i n noe of C j, whih mens tht C i n C j re the sme strongly onnete omponent, whih is impossile. Let us show now tht for ny noe x, is rehle from x in G S. By ontrition, let us suppose tht there is noe x from whih is not rehle. Let us onsier the pth strting from x in G S. Either there exists noe on the pth tht hs no next-hop on G S, or the pth hs loop. We just prove tht there is no loop in G S, so there hs to e noe y without next-hop. By onstrution of G S, we n see tht ll noes y S (V 1 \S ) V 2 = V hve next-hop, so estintion is rehle from ny noe x in G S. This ompletes the proof. Figure4showsnexmpleofgrphofninenoes,whereestintionisnoef. TheroutingprotoolsR 1 n R 2 re shown on Figure 4(). To uil the first vli step, ll routing rs re onsiere. The strongly onneteomponentsoftheresultinggrphrethefollowing: C 1 = {f},c 2 = {,}nc 3 = {,,e,g,h,i}. The following sets verify the property of the theorem: C 1 = {f}, C 2 = {} n C 3 = {,g,h,i}. Inee, it n e verifie tht none of the grphs G i (for i {1,2,3}) hs loop (this n lso e seen on the grph shown on Figure 4()). Thus, the step S 1 = {,,f,g,h,i} is vli first step. To uil the seon vli step, the strongly onnete omponents of the grph shown on Figure 4() re ompute. They re the following: C 1 = {}, C 2 = {},..., C 9 = {i}. The following sets verify the property of the theorem: C 1 = {}, C 3 = {}, C 5 = {e}, n C i = otherwise. The seon step is S 2 = {,,e}. After this step, ll noes route oring to R 2. Thus, T = (S 1,S 2 ) is loop-free sequene Centrlize heuristi for loop-free hnge of routing protools In this susetion, we esrie our entrlize heuristi for loop-free hnge, lle Strongly Connete omponent Heuristi with prllel hnges (SCH-p). We ssume tht entrlize entity knows the whole network topology, s well s R 1 n R 2 for eh estintion. 8

10 e f e f e f g h i g h i g h i () () () Figure 4: Sequene se on strongly onnete omponents. () The grph hs three strongly onnete omponents C 1 = {f}, C 2 = {,}, C 3 = {,,e,g,h,i}. () The first step is S 1 = {,,f,g,h,i}, n only the noes of S 1 n route oring to R 1 or R 2. () The seon step is S 2 = {,,e}, n only the noes of S 2 n route oring to R 1 or R 2. SCH-p is se on Algorithm 2. Eh estintion is onsiere sequentilly n inepenently. First, the set of strongly onnete omponents of the grph is uilt se on the two routing protools for the urrent estintion. Then, eh strongly onnete omponent C i is onsiere iniviully, n noes re istriute into severl steps oring to Algorithm 3. We use greey pproh: for eh step S j, we noes one y one into set C i,j, until it is not possile to more noes without violting the onstrints of Theorem 1. Then, we move to the next step, until ll noes of C i re in step for this estintion. The worst-se omplexity of SCH-p is O( V 5 ). Inee, there re t most V estintions. For eh estintion, the strongly onnete omponents of grph n e ompute in O( V + E ) with Trjn s lgorithm [19]. Note tht in our grphs, E 2 V s eh noe hs t most two outgoing rs (one with R 1 n one with R 2 ). For eh strongly onnete omponent C i, there re t most C i resulting steps (s there is t lest one noe per step). Computing the set C i,j requires onsiering t most C i 2 omintions of noes, eh requiring to uil G n etermining if it hs loop, whih n e one in O( C i ). As the set of strongly onnete omponents prtitions the grph, we otin the overll omplexity of O( V 5 ). 4. Simultion results In this setion, we esrie our simultion results. We strt y esriing our settings. Then, we quntify the proility of loop ourrene when using ritrry routing protools, with unontrolle hnges (tht is, without ny heuristi to voi trnsient loops). We lso quntify the numer of troulesome estintions for RTH n RTH-p. Then, we ompute the numer of steps require to hnge the routing protools for RTH, RTH-p n our heuristi SCH-p Topologies n prmeter settings We use two types of topologiesin orer to evlute the heuristis overlrgenumer of networks. First, we eie to generte rnom onnete grphs. We generte networks ompose of 50,, 150, 200, 250, n 300 noes, rnomly eploye on n re of m m. Noes tht re istnt of less thn 20 m re onsiere onnete. Seon, we eie to test our heuristi SCH-p on rel networks. We use the Roketfuel network topologies [20, 21], whih re lso use for the evlution of RTH in [8]. The resulting topologies hve 79, 87, 104, 138, 161, n 315 noes. In the following, we use three senrios for the routing protools. They re ll se on shortest pths, using ifferent link metris. In Senrio 1, R 1 uses the hop-ount metri n R 2 uses rnom metri, hosen rnomly within [1;] for eh link. R 2 moels protool se on ely or loss rte. In Senrio 2, oth R 1 n R 2 re se on inepenent rnom metris hosen within [1;] (suh s ely for R 1 n loss rte for R 2 ). In Senrio 3, R 1 is se on rnom metri hosen within [1;] for eh link, n R 2 uses orrelte weight for links. If w [1;] enotes the weight of the link for R 1, the weight of the link for R 2 is hosen rnomly within [mx(1,w 10);min(,w + 10)]. This moels the 9

11 Algorithm 2 Min lgorithm for SCH-p. Require: G = (V,E) grph, D V set of estintions, R 1 n R 2 two routing protools (for eh estintion of D) Ensure: T is vli sequene j 1 for D o mx 1 C strongly onnete omponents of G (with rs resulting of R 1 n R 2 for estintion ) for C i C o if C i = 1 then S j S j C i else ol j while there re noes of C i tht re not in step yet o fin suitle set C i,j C i (see Algorithm 3) S j S j C i,j j j +1 en while if j 1 > mx then mx j 1 en if j ol en if en for j j +mx en for return T = (S 1,...,S j 1 ) Algorithm 3 Computtion of one step for C i in SCH-p. Require: C i is strongly onnete omponent (with t lest two noes), is estintion, the list of previous steps is known Ensure: C i,j stisfies Theorem 1 C i,j en flse while not en o en true for noe n in C i o if n is not lrey in step n n / C i,j then uil G with the noes of G n no eges for eh noe m tht hs een e in previous step, r (m,r 2 (m)) to G for eh noe m C i,j {n}, rs (m,r 1(m)) n (m,r 2 (m)) to G for eh other noe m, r (m,r 1 (m)) to G if G oes not ontin loop then C i,j C i,j {n} en flse en if en if en for return C i,j en while 10

12 se where protool R 2 uses n upte version of the topology, or inlues n itionl prmeter in the omputtion of link weights Simultion on loop ourrene with unontrolle hnges We onsier tht loop ours if it is possile for pket to enter routing loop when noes on the pth eie ritrrily to route oring to R 1 or R 2. For instne, we onsier tht there is loop in the topology shown on Figure 1, euse it is possile tht routes oring to R 1 while routes oring to R 2. Notie tht even if there is loop ourrene in topology, some noes might e le to sen pkets to the estintion without loops. Thus, our metri refers to the risk of ourrene of t lest one loop. In the following, ll the results on loop ourrenes re verge over simultions per estintion, n over ll possile estintions Loop ourrenes on rnom networks In this sususetion, we quntify the proility of loop ourrene for rnom grphs, in the three previous senrios. Figure 5 shows the perentge of loop ourrene s funtion of the numer of noes in the network, for the three senrios. In Senrio 1, the perentge of loop ourrene inreses with the numer of noes. Even when the numer of noes is smll (for instne, 50), the perentge of loop ourrene is out 60%, whih mens tht loops re likely to our. This omes from the ft tht the two routing protools uil pths with low orreltionsue to the rnom weight of R 2. In Senrio2, the perentge of loop ourrene is out % for ll numers of noes in the network. This is ue to the ft tht R 1 n R 2 yiel to ifferent routing eisions, thus pths hve very low orreltion. In Senrio 3, the perentge of loops is low for smll numer of noes. Inee, sine the link metris re orrelte, R 1 n R 2 re likely to e similr, so pkets re likely to follow similr pths. However, when the numer of noes is lrge, the two routing protools exhiit ifferenes, n the resulting shortest pths hve low orreltions (even if the weights re orrelte). % loop ourrene Senrio 1 Senrio 2 Senrio Numer of noes in the network Figure 5: In rnom networks, when R 1 is se on hop-ount metri n R 2 is se on rnom metri, the perentge of loop ourrene is high, ue to the low orreltion of the metris of R 1 n R 2. When R 1 n R 2 re oth se on rnom metri, the perentge of loop ourrene is very high, gin ue to the very low orreltion of the metris of R 1 n R 2. When R 1 is se on rnom metri n R 2 is se on evition of the metri of R 1, the perentge of loop ourrene is high for topologies with lrge numer of noes, espite the high orreltion of the metris Loop ourrenes on rel networks In this sususetion, we quntify the numer of loops tht might pper using R 1 n R 2, for rel networks. Figure 6 shows the perentge of loop ourrene s funtion of the numer of noes, for the three senrios. We notie tht the perentge of loop ourrene is muh lrger with Senrio 1 n Senrio 2 11

13 thn with Senrio 3. This is ue to the ft tht the routing protools R 1 n R 2 of Senrio 3 re highly orrelte. However, the perentge of loop ourrene is more importnt for lrge networks s the pths re longer. For rel networks, the perentge of loop ourrene epens on the unerlying topology. In generl, this perentge inreses with the network size, ut there re some rel topologies (suh s the Roketfuel topology 1221.ity with 104 noes) tht yiel few routing loops (see lso Figure 16 of [8]). % loop ourrene Senrio 1 Senrio 2 Senrio Numer of noes in the network Figure 6: In rel networks, for Senrio 1, the perentge of loops is high (etween 50% n 80% for smll networks (less thn 104 noes), n ove 90% for lrge networks). For Senrio 2, the perentge of loops is lwys high inepenently of the network size (etween 90% n %). For Senrio 3, the perentge of loops inreses with the network size (10% for smll networks n up to 90% for lrge networks) Averge perentge of troulesome estintions In this susetion, we fous on the perentge of troulesome estintions. Troulesome estintions re estintions tht require to e onsiere inepenently y RTH n RTH-p. These estintions nnot follow the ommon per-router orering use for ll the remining estintions. We ompute the numer of troulesome estintions for rnom n rel networks y verging over simultions, n we normlize it with respet to the numer of noes of the network in orer to otin perentge. All noes t s estintions Troulesome estintions for rnom networks Figure 7 shows the verge perentge of troulesome estintions in rnom networks. We notie tht the perentge of troulesome estintions is low for smll networks n inreses onsistently for lrge networks. This is ue to the ft tht the perentge of loop ourrene is smll (f Sususetion 4.2.1). Moreover, the perentge of troulesome estintions epens on the senrios. In Senrio 1, we notie tht the perentge of troulesome estintions is low for smll networks (less thn 26%) ut it inreses quikly for lrge networks (up to 94%). In Senrio 2, the perentge of troulesome estintions is out 80% for network of 50 noes n goes up to out % for network of 300 noes. In Senrio 3, the perentge of troulesome estintions is lmost zero for smll networks when R 1 n R 2 re highly orrelte, ut it inreses up to 98% for lrge networks Troulesome estintions for rel networks Figure 8 shows the perentge of troulesome estintions in rel networks. For Senrio 1 n Senrio 2, the perentge of troulesome estintions is importnt (etween 70% n % for Senrio 1, n ove 90% for Senrio 2) for lrge networks. This perentge is low for smll networks s pths to estintions re smller, whih les to smll numer of loops in the network (f Sususetion 4.2.2). For Senrio 3, the perentge of troulesome estintions is low, even for lrge networks. Note tht the low perentge of troulesome estintions for Senrio 3 is the min rgument use y uthors of [8] to justify tht there re few troulesome estintions. However, we elieve tht Senrio 3 represents only speifi se, where the two routing protools re highly orrelte. 12

14 % troulesome estintions Senrio 1 Senrio 2 Senrio Numer of noes in the network Figure 7: In rnom networks, the perentge of troulesome estintions is more importnt in lrge networks thn in smll networks. Troulesome estintions pper even with orrelte routing protools (suh s in Senrio 3). % troulesome estintions Senrio 1 Senrio 2 Senrio Numer of noes in the network Figure 8: In rel networks, the perentge of troulesome estintions is more importnt in lrge networks thn in smll networks. Correlte routing protools (see Senrio 3) re le to gretly reue the numer of troulesome estintions. 13

15 4.4. Results on verge numer of steps In this susetion, we evlute the numer of steps require for ll the noes to hnge from R 1 to R 2 without ny loop ourrene. This is our min metri, s the hnge urtion is proportionl to the numer of steps proue y the heuristis. We onsier tht ll noes re estintions. Simultion results re verge over repetitions n onfiene intervls of 95% re shown. We ompre our heuristi SCH-p to RTH [8]. Rell tht RTH provies n orering to hnge the noes sequentilly: the numer of steps of RTH is equl to the numer of noes in the network, if there is no troulesome estintion. We lso ompre our heuristi SCH-p to RTH-p. Rell tht RTH-p onsists of hnging severl noes in prllel Numer of steps for rnom networks Figure 9 shows the verge numer of steps require to hnge the routing protool, in term of the numer of noes in the network, for Senrio 1. The y-xis is epite using logrithmi sle. We notie tht the numer of step inreses onsistently with the size of the network for ll the heuristis (RTH, RTH-p n SCH-p). We notie lso tht the numer of steps is very lrge for RTH. This is ue to the ft tht only one noe t eh step is le to hnge from R 1 to R 2. More preisely, the numer of steps for RTH is equl to the numer of noes in the network, times α + 1, where α is the numer of troulesome estintions. Both RTH-p n SCH-p outperform RTH with gin tht rehes up to 97% for RTH-p, n up to 99% for SCH-p. SCH-p outperforms RTH-p: for lrge networks (more thn noes), SCH-p shows gin of 63% for network of noes, n gin of 77% for network of 300 noes. The lrge gin of SCH-p n e expline s follows: SCH-p is le to hnge the routing protool of noes inepenently on their position on the pths from the soures to the estintions (oring to R 2 ), while RTH-p only hnges the routing protool for noes strting from the estintions n going kwr to the soures. Sine the numer of troulesome estintions is lrge (see Fig. 7), RTH-p is not le to ggregte mny non-troulesome estintions together. 000 Numer of steps 00 0 RTH RTH-p SCH-p Numer of noes in the network Figure 9: In rnom networks for Senrio 1, SCH-p is le to perform the hnge in out 600 steps on verge for lrge networks. RTH n RTH-p require respetively steps n 2602 steps to perform the hnge of ll the noes. Figure 10 shows the verge numer of steps require to hnge the routing protools in term of the numer of noes, for Senrio 2. The y-xis is epite using logrithmi sle. We n see tht the numer of steps inreses onsistently with the size of the network. We notie lso the sme ehvior for RTH s in Fig. 9: the numer of steps require to hnge ll the noes is very lrge, espeilly for lrge networks. RTH proues 2021 steps for networks of 50 noes, n steps for networks of 300 noes. 14

16 000 Numer of steps 00 0 RTH RTH-p SCH-p Numer of noes in the network Figure 10: In rnom networks n for Senrio 2, SCH-p is le to perform the hnge in out 761 steps on verge for lrge networks. RTH n RTH-p require respetively steps n 3864 steps to perform the hnge of ll the noes. SCH-p outperforms RTH-p (respetively RTH), with gin vrying from 57% (respetively 94%) for smll networks up to 80% (respetively 99%) for lrge networks. Figure11showsthe vergenumerofstepsintermofthe numerofnoesinthe network,forsenrio3. The y-xis is epite using logrithmi sle. RTH-p shows etter ehvior thn SCH-p for smll networks of less thn 150 noes. Inee, RTH-p shows gin of 89% for network of 50 noes n 11% for network of noes ompre to SCH-p. Those gins re ue to the ft tht there re few troulesome estintions in this se, s R 1 n R 2 re highly orrelte. Rell tht SCH-p onsiers estintions inepenently, n thus is not le to enefit from non-troulesome estintions. SCH-p is etter thn RTH-p for lrge networks. Inee, SCH-p shows gin of 42% for network of 150 noes n of 61% for network of 300 noes, ompre to RTH-p. 000 Numer of steps 00 0 RTH 10 RTH-p SCH-p Numer of noes in the network Figure 11: In rnom networks n for Senrio 3, SCH-p is le to perform the hnge in out 998 steps on verge for lrge networks. RTH n RTH-p require respetively steps n 2585 steps to perform the hnge of ll the noes Numer of steps for rel networks Figure12 showsthe vergenumer ofsteps in term ofthe numer of noes for Senrio1n Roketfuel topologies. The y-xis is epite using logrithmi sle. We notie the sme ehvior s for rnom networks. For smll networks, SCH-p n RTH-p hieve similr performne. For lrge networks, SCH-p shows etter performne thn RTH-p: SCH-p shows gin tht rehes 99% ompre to RTH n 68% ompre to RTH-p, for network of 315 noes. Figure13showsthe vergenumerofstepsintermofthe numerofnoesinthe network,forsenrio2, using logrithmi sle. The gin of SCH-p rehes 96% for the smllest network ompre to RTH, n 15

17 000 Numer of steps 00 0 RTH RTH-p SCH-p Numer of noes in the network Figure 12: In rel networks n for Senrio 1, SCH-p is le to perform the hnge in out 664 steps on verge for the lrgest network (315 noes). RTH n RTH-p require respetively steps n 2121 steps to perform the hnge of ll the noes. 48% ompre to RTH-p. The lrgest gin rehe for the lrgest network is 99% ompre to RTH, n 69% ompre to RTH-p. Numer of steps RTH RTH-p SCH-p Numer of noes in the network Figure 13: In rel networks n for Senrio 2, SCH-p is le to perform the hnge in out 869 steps on verge for the lrgest network. RTH n RTH-p require respetively steps n 2851 steps to perform the hnge of ll the noes. Figure14showsthe vergenumerofstepsintermofthe numerofnoesinthe network,forsenrio3, using logrithmi sle. RTH-p is etter thn SCH-p ue to the very smll numer of troulesome estintions in this speifi senrio n for these speifi networks. The gin of RTH-p rehes 94% for network of 104 noes. The omputtion time of SCH-p is lrger thn the omputtion time of RTH n RTH-p. With our mono-thre implementtion on i CPU t 3.40 GHz (with eight ores), SCH-p is le to ompute ll the steps for the lrgest rel topology in 91 seons on verge (with stnr evition of 3 seons, n for Senrio 2 whih yiels the lrgest numer of loops). RTH n RTH-p ompute ll the steps in 1.5 seons n 2.2 seons respetively. However, we elieve tht the omputtion time of SCH-p is resonle for lrge networks of 300 noes, n tht the gin of the hnge urtion outweights the omputtion time. 5. Conlusion When routing protool hs to e hnge, trnsient routing loops might our in the network. In this pper, we quntifie the perentge of loop ourrene on severl senrios. We show tht loops n e ompletely voie y hving noes hnge their routing protool oring to sequene whih epens 16

18 000 Numer of steps 00 0 RTH 10 RTH-p SCH-p Numer of noes in the network Figure 14: In rel networks n for Senrio 3, RTH-p is generlly etter thn SCH-p ue to the very low numer of troulesome estintions. SCH-p performs the hnge in out 666 steps for the lrgest network. RTH n RTH-p require respetively steps n 698 steps to perform the hnge of ll the noes. on the topology n on the routing protools. This sequene is list of steps, where eh step is set of noes tht n hnge their routing protool in ritrry orer. We propose RTH-p, n enhnement of the RTH heuristi [8], tht is le to hnge severl noes in prllel. Then, we propose SCH-p, entrlize heuristi whih uils sequenes with smll numer of steps. Reuing the numer of steps is ruil, s the urtion of hnge is proportionl to the numer of steps. Simultion results for rnom n rel networks show tht SCH-p outperforms oth RTH n RTH-p in most senrios. The gin of SCH-p in term of numer of steps vries etween 80% n 99% when ompre to RTH, n etween 61% n 77% for most lrge networks when ompre to RTH-p. Referenes [1] K. Butler, T. R. Frley, P. MDniel, J. Rexfor, A survey of BGP seurity issues n solutions, Proeeings of the IEEE 98 (1) (2010) 122. [2] P. Trks, T. Zhriis, S. Voliotis, P. Krkzis, T. Velivsski, L. Srkis, Routing metri seletion n esign for multi-purpose WSN, in: IWSSIP (Interntionl Conferene on Systems, Signls n Imge Proessing), 2014, pp [3] Z. Zhong, R. Kerlpur, S. Nelkuiti, Y. Yu, J. Wng, C. N. Chuh, S. Lee, Avoiing trnsient loops through interfe-speifi forwring, in: IEEE/ACM IWQoS (Interntionl Symposium on Qulity of Servie), Vol of Leture Notes in Computer Siene, Springer, 2005, pp [4] P. Frnois, O. Bonventure, Avoiing trnsient loops uring the onvergene of link-stte routing protools, IEEE/ACM Trnstions on Networking 15(6)(2007) oi: /tnet [5] S. Nelkuiti, Z. Zhong, J. Wng, R. Kerlpur, C. N. Chuh, Mitigting trnsient loops through interfe-speifi forwring, Computer Networks 52 (3) (2008) [6] N. El Rhkiy, A. Guitton, M. Misson, Avoiing routing loops in multi-stk WSN, JCM (Journl of Communitions) 8 (3) (2013) [7] N. El Rhkiy, A. Guitton, M. Misson, Improving routing performne when severl routing protools re use sequentilly in WSN, in: ICC (IEEE Interntionl Conferene on Communitions), 2013, pp [8] L. Vnever, S. Vissihio, C. Pelsser, P. Frnois, O. Bonventure, Lossless migrtions of link-stte IGPs, IEEE/ACM Trnstions on Networking 20 (6) (2012)

19 [9] R. Shirni, M. St-Hilire, T. Kunz, Y. Zhou, J. Li, L. Lmont, Comine retive-geogrphi routing for unmnne eronutil ho networks, in: IWCMC (Interntionl Wireless Communitions n Moile Computing Conferene), [10] S. Mo, M. T. Hnsen, R. Jurk, B. Kusy, N. Boullh, A. Ksentini, On lning etween minimum energy n minimum ely with rio iversity for wireless sensor networks, in: IFIP Wireless Dys, [11] M. Fonoge, M. Crei, A. Amrose, A QoS se routing protool for wireless sensor networks, in: IPCCC (IEEE Performne Computing n Communitions Conferene), [12] J. Steffn, L. Fiege, M. Cili, A. P. Buhmnn, Towrs multi-purpose wireless sensor networks, in: Systems Communitions, 2005, pp [13] J. Steffn, M. Voss, Seurity mehnisms for multi-purpose sensor networks, in: GI Jhrestgung, Vol. 2, 2005, pp [14] D. Mnjunth, S. V. Goplih, A multi-purpose wireless sensor network for resientil lyouts, in: BWCCA (Interntionl Conferene on Bron n Wireless Computing, Communition n Applitions), 2007, pp [15] P. Jvier el Ci, Optimizing resoure use in multi-purpose WSNs, in: PerCom Workshops (Pervsive Computing Workshops), 2011, pp [16] L. Srkis, T. Zhriis, H.-C. Leligou, M. Dohler, A frmework for servie provisioning in virtul sensor networks, EURASIP Journl on Wireless Communitions n Networking (1) (2012) 135. [17] F. Cl, P. Merinol, J.-J. Pnsiot, P. Frnois, O. Bonventure, Greful onvergene in link-stte IP networks: A lightweight lgorithm ensuring miniml opertionl impt, IEEE/ACM Trnstions on Networking 22 (1) (2013) oi: /tnet [18] F. Cl, P. Merinol, S. Vissihio, J.-J. Pnsiot, P. Frnçois, Greful router uptes for link-stte protools, in: IEEE ICNP (Interntionl Conferene on Network Protools), [19] R. E. Trjn, Depth-first serh n liner grph lgorithms, SIAM Journl on Computing 1 (2) (1972) [20] N. Spring, R. Mhjn, D. Wetherll, Mesuring ISP topologies with roketfuel, in: ACM SIGCOMM, 2002, pp [21] Roketfuel projet, (2002). 18

A Novel Virtual Anchor Node-based Localization Algorithm for Wireless Sensor Networks

A Novel Virtual Anchor Node-based Localization Algorithm for Wireless Sensor Networks Novel Virtul nhor Noe-se Loliztion lgorithm for Wireless Sensor Networks Pengxi Liu Xinming Zhng Shung Tin Zhiwei Zho Peng Sun Deprtment of Computer Siene n Tehnology University of Siene n Tehnology of

More information

A Low Power Parallel Sequential Decoder for Convolutional Codes

A Low Power Parallel Sequential Decoder for Convolutional Codes Int. J. Com. Dig. Sys. 2, No. 2, 95-(23) 95 Interntionl Journl of Computing n Digitl Systems http://x.oi.org/.2785/ijs/226 @ 23 UOB SPC, University of Bhrin A Low Power Prllel Sequentil Deoer for Convolutionl

More information

Energy Efficient TDMA Sleep Scheduling in Wireless Sensor Networks

Energy Efficient TDMA Sleep Scheduling in Wireless Sensor Networks Energy Effiient TDMA Sheuling in Wireless Sensor Networks Junho M, Wei Lou Deprtment of Computing The Hong Kong Polytehni University Kowloon, Hong Kong {sjm, sweilou}@omp.polyu.eu.hk Ynwei Wu, Xing-Yng

More information

Unilateral and equitransitive tilings by squares of four sizes

Unilateral and equitransitive tilings by squares of four sizes Also ville t http://m-journl.eu ISSN 1855-3966 (printe en.), ISSN 1855-3974 (eletroni en.) ARS MATHEMATICA CONTEMPORANEA 10 (2015) 135 167 Unilterl n equitrnsitive tilings y squres of four sizes Csey Mnn

More information

3878 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 9, SEPTEMBER Optimal Algorithms for Near-Hitless Network Restoration via Diversity Coding

3878 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 9, SEPTEMBER Optimal Algorithms for Near-Hitless Network Restoration via Diversity Coding 3878 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 6, NO. 9, SEPTEMBER 23 Optiml Algorithms for Ner-Hitless Network Restortion vi Diversity Coing Serht Nzim Avi, Stuent Memer, IEEE, n Ener Aynoglu, Fellow,

More information

(1) Primary Trigonometric Ratios (SOH CAH TOA): Given a right triangle OPQ with acute angle, we have the following trig ratios: ADJ

(1) Primary Trigonometric Ratios (SOH CAH TOA): Given a right triangle OPQ with acute angle, we have the following trig ratios: ADJ Tringles nd Trigonometry Prepred y: S diyy Hendrikson Nme: Dte: Suppose we were sked to solve the following tringles: Notie tht eh tringle hs missing informtion, whih inludes side lengths nd ngles. When

More information

COMPUTER NETWORK DESIGN Network layer protocols

COMPUTER NETWORK DESIGN Network layer protocols OMPUTER NETWORK ESIGN Network lyer protools Network lyer (lyer 3) Gruppo Reti TL nome.ognome@polito.it http://www.telemti.polito.it/ OMPUTER NETWORK ESIGN Review of network lyer protools - opyright This

More information

Detection of Denial of Service attacks using AGURI

Detection of Denial of Service attacks using AGURI Detetion of Denil of Servie ttks using AGURI Ryo Kizki Keio Univ. kizki@sf.wide.d.jp Kenjiro Cho SonyCSL kj@sl.sony.o.jp Osmu Nkmur Keio Univ. osmu@wide.d.jp Astrt Denil of Servie ttks is divided into

More information

Computational Complexity of a Pop-up Book

Computational Complexity of a Pop-up Book omputtionl omplexity of Pop-up ook Ryuhei Uehr Shio Termoto strt Origmi is the enturies-ol rt of foling pper, n reently, it is investigte s omputer siene: Given n origmi ith reses, the prolem to etermine

More information

arxiv: v1 [cs.it] 16 Nov 2017

arxiv: v1 [cs.it] 16 Nov 2017 Sptio-Temporl Motifs for Optimize Vehile-to-Vehile (V2V) Communitions Tenghn Zeng, Omi Semiri, n Wli S Wireless@VT, Brley Deprtment of Eletril n Computer Engineering, Virgini Teh, Blksurg, VA, USA Emils:{tenghn,

More information

EASY DISC Assessment

EASY DISC Assessment EASY DISC Assessment Instrution: Selet the one most pproprite response for eh question. 1. In my work environment, it is most importnt to me... To help o-workers n to e in peeful environment. To feel tht

More information

Fubini for continuous functions over intervals

Fubini for continuous functions over intervals Fuini for ontinuous funtions over intervls We first prove the following theorem for ontinuous funtions. Theorem. Let f(x) e ontinuous on ompt intervl =[, [,. Then [, [, [ [ f(x, y)(x, y) = f(x, y)y x =

More information

Resistors, Current and Voltage measurements, Ohm s law, Kirchhoff s first and second law. Kirchhoff s first Objectives:

Resistors, Current and Voltage measurements, Ohm s law, Kirchhoff s first and second law. Kirchhoff s first Objectives: EE -050 Ciruit L Experiment # esistors, Current nd Voltge mesurements, Ohm s lw, Kirhhoff s first nd seond lw. Kirhhoff s first Ojetives: Slmn in Adul Aziz University Eletril Engineering Deprtment. Fmiliriztion

More information

A Secure Localization Method in Wireless Sensor Network

A Secure Localization Method in Wireless Sensor Network Vol. 1(3), Ot. 2015, pp. 212-219 A Seure Loliztion Metho in Wireless Sensor Network Mrym Mirzei, Mohmm Rotmili n Mehi Khlili Dept. of Computer n Informtis Engineering, Pym Noor University, Tehrn, Irn *Corresponing

More information

Optimal Time Slot Assignment for Mobile Ad Hoc Networks

Optimal Time Slot Assignment for Mobile Ad Hoc Networks Optiml Time Slot Assignment for Mobile A Ho Networks Koushik Sinh Honeywell Tehnology Solutions Lb, Bnglore, 560076 Ini sinh kou@yhoo.om Abstrt. We present new pproh to fin ollision-free trnsmission sheule

More information

Probability and Statistics P(A) Mathletics Instant Workbooks. Copyright

Probability and Statistics P(A) Mathletics Instant Workbooks. Copyright Proility nd Sttistis Student Book - Series K- P(A) Mthletis Instnt Workooks Copyright Student Book - Series K Contents Topis Topi - Review of simple proility Topi - Tree digrms Topi - Proility trees Topi

More information

Question Paper Wednesday 13 Thursday 14 January 2010

Question Paper Wednesday 13 Thursday 14 January 2010 KEY SKILLS INFORMATION AND COMMUNICATION TECHNOLOGY Level 3 ArtComp [KSI31] Question Pper Wenesy 13 Thursy 14 Jnury 2010 Do NOT open this Question Pper until you re tol to y the invigiltor THERE ARE THREE

More information

Proposed Cable Tables for SAS2

Proposed Cable Tables for SAS2 Tle 50 Requirements for internl le ssemlies using SASDrive onnetors n kplnes. Requirement, Units 1,5 Gps 3Gps 6 Gps Bulk le or kplne:, Differentil impene ohm 100 ± 10 100 g Common-moe impene ohm 32,5 ±

More information

THIS LECTURE looks at bell ringing (the posh name is Tintinnalogia) which as. WE NORMALLY think of a bell as hanging mouth down. If we swing the bell,

THIS LECTURE looks at bell ringing (the posh name is Tintinnalogia) which as. WE NORMALLY think of a bell as hanging mouth down. If we swing the bell, 7 Bells THIS LECTURE looks t ell ringing (the posh nme is Tintinnlogi) whih s n orgnize tivity hs een roun for long time. Inee, n importnt ook y Stemn on the sujet ws pulishe in 1668 (two yers fter the

More information

Math Circles Finite Automata Question Sheet 3 (Solutions)

Math Circles Finite Automata Question Sheet 3 (Solutions) Mth Circles Finite Automt Question Sheet 3 (Solutions) Nickols Rollick nrollick@uwterloo.c Novemer 2, 28 Note: These solutions my give you the nswers to ll the prolems, ut they usully won t tell you how

More information

ASY P.O. BOX 729 TERRELL, TEXAS / PAGE 1 OF 13 SAM

ASY P.O. BOX 729 TERRELL, TEXAS / PAGE 1 OF 13 SAM 203 Madix Inc., ll rights reserved ommon Parts 2 MXI GRI WIRE GRI SHELF WITH (GPWGS) MXI GRI FIXTURE PNEL (GPWFP) FIXTURE PNELS RE USE S EN SUPPORT. SHELF N E USE NYWHERE. MXI GRI REINFORMENT R 3 (GPR)

More information

ALONG with the maturity of mobile cloud computing,

ALONG with the maturity of mobile cloud computing, An Optiml Offloding Prtitioning Algorithm in Moile Cloud Computing Huming Wu, Dniel Seidenstüker, Yi Sun, Crlos Mrtín Nieto, Willim Knottenelt, nd Ktink Wolter system, nd their min gol is to keep the whole

More information

The Great-Case Cabinet Company

The Great-Case Cabinet Company Hng Angle Mesurement Proeure To ensure tht your guitr is hoste properly, we nee to know how ig it is. Our lrgest inet will host lmost ny guitr on the mrket, ut more eonomil size my e equte. If you hve

More information

Uplinks Analysis and Optimization of Hybrid Vehicular Networks

Uplinks Analysis and Optimization of Hybrid Vehicular Networks Uplinks Anlysis n Optimiztion of Hybri Vehiulr Networks Shikun Li 1, Zipeng Li 1, Xiohu Ge 1, Yonghui Li 2 1 Shool of Eletroni Informtion n Communitions, Huzhong University of Siene n Tehnology Wuhn, Hubei

More information

ECE 274 Digital Logic Spring Digital Design. Combinational Logic Design Process and Common Combinational Components Digital Design

ECE 274 Digital Logic Spring Digital Design. Combinational Logic Design Process and Common Combinational Components Digital Design ECE 27 Digitl Logi Spring 29 Comintionl Logi Design Proess n Common Comintionl Components Digitl Design 2.7 2. Digitl Design Chpter 2: Comintionl Logi Design Slies to ompn the tetook Digitl Design, irst

More information

Computers and Mathematics with Applications. An evaluation study of clustering algorithms in the scope of user communities assessment

Computers and Mathematics with Applications. An evaluation study of clustering algorithms in the scope of user communities assessment Computers nd Mthemtis with Applitions 58 (29) 198 1519 Contents lists ville t SieneDiret Computers nd Mthemtis with Applitions journl homepge: www.elsevier.om/lote/mw An evlution study of lustering lgorithms

More information

Aluminium Roof Outlets - Introduction to Detail Outlets

Aluminium Roof Outlets - Introduction to Detail Outlets Aluminium Roof Outlets - Introution to Detil Outlets The Hrmer Roof Detil rnge inlues outlets to over ll the wkwr etiling situtions tht our in uiling esign n in refurishment. Min Chrteristis Hrmer Roof

More information

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES Romn V. Tyshchuk Informtion Systems Deprtment, AMI corportion, Donetsk, Ukrine E-mil: rt_science@hotmil.com 1 INTRODUCTION During the considertion

More information

Evaluating territories of Go positions with capturing races

Evaluating territories of Go positions with capturing races Gmes of No Chne 4 MSRI Pulitions Volume 63, 2015 Evluting territories of Go positions with pturing res TEIGO NAKAMURA In nlysing pturing res, or semeis, we hve een fousing on the method to find whih plyer

More information

Online Testing for Three Fault Models in Reversible Circuits

Online Testing for Three Fault Models in Reversible Circuits 25 IEEE 45th Interntionl Smposium on MultipleVlue Logi Online Testing for Three Fult Moels in Reversile Ciruits M Asif Nshir Dept. of Mth n Computer Siene Universit of Lethrige Lethrige, AB Cn Emil: sif.nshir@uleth.

More information

Fig. 6. SIR distribution for different number of sectors per cell

Fig. 6. SIR distribution for different number of sectors per cell 0 0 setors per ell: setors per ell: 0 setors per ell: For 0 B (no fing), B n B s the stnr evition, the 99%-overge SIR is B,. B, n. B respetively. A onfiene nlysis for ifferent sees for lognorml fing shows

More information

GLONASS PhaseRange biases in RTK processing

GLONASS PhaseRange biases in RTK processing ASS PhseRnge ises in RTK proessing Gle Zyrynov Ashteh Workshop on GSS Bises 202 Bern Switzerlnd Jnury 8-9 202 Sope Simplified oservtion models for Simplified oservtion models for ASS FDMA speifi: lok nd

More information

ISM-PRO SOFTWARE DIGITAL MICROSCOPE OPERATION MANUAL

ISM-PRO SOFTWARE DIGITAL MICROSCOPE OPERATION MANUAL MN-ISM-PRO-E www.insize.om ISM-PRO SOFTWARE DIGITAL MICROSCOPE OPERATION MANUAL Desription Clik Next. As the following piture: ISM-PRO softwre is for ISM-PM00SA, ISM-PM600SA, ISM- PM60L digitl mirosopes.

More information

Lecture 16. Double integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts.

Lecture 16. Double integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts. Leture 16 Double integrls Dn Nihols nihols@mth.umss.edu MATH 233, Spring 218 University of Msshusetts Mrh 27, 218 (2) iemnn sums for funtions of one vrible Let f(x) on [, b]. We n estimte the re under

More information

SLOVAK UNIVERSITY OF TECHNOLOGY Faculty of Material Science and Technology in Trnava. ELECTRICAL ENGINEERING AND ELECTRONICS Laboratory exercises

SLOVAK UNIVERSITY OF TECHNOLOGY Faculty of Material Science and Technology in Trnava. ELECTRICAL ENGINEERING AND ELECTRONICS Laboratory exercises SLOVAK UNIVERSITY OF TECHNOLOGY Fulty of Mteril Siene nd Tehnology in Trnv ELECTRICAL ENGINEERING AND ELECTRONICS Lbortory exerises Róbert Riedlmjer TRNAVA 00 ELECTRICAL ENGINEERING AND ELECTRONICS Lbortory

More information

The PWM switch model introduced by Vatché Vorpérian in 1986 describes a way to model a voltage-mode switching converter with the VM-PWM switch model.

The PWM switch model introduced by Vatché Vorpérian in 1986 describes a way to model a voltage-mode switching converter with the VM-PWM switch model. The PWM swith model introdued by Vthé Vorpérin in 1986 desribes wy to model voltge-mode swithing onverter with the VM-PWM swith model. The lrge-signl model is equivlent to d trnsformer whose turns rtio

More information

Pearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE England and Associated Companies throughout the world

Pearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE England and Associated Companies throughout the world Person Edution Limited Edinurgh Gte Hrlow Essex M20 2JE Englnd nd ssoited ompnies throughout the world Visit us on the World Wide We t: www.personed.o.uk Person Edution Limited 2014 ll rights reserved.

More information

Q tomography towards true amplitude image and improve sub-karst image Yang He and Jun Cai, TGS

Q tomography towards true amplitude image and improve sub-karst image Yang He and Jun Cai, TGS Q tomogrphy towrs true mplitue imge n improve su-krst imge Yng He n Jun Ci, TGS Summry A frequeny omin tomogrphi inversion ws evelope to estimte frequeny epenent energy ttenution y using prestk epth migrtion

More information

Seamless Integration of SER in Rewiring-Based Design Space Exploration

Seamless Integration of SER in Rewiring-Based Design Space Exploration Semless Integrtion of SER in Rewiring-Bsed Design Spe Explortion Soeeh Almukhizim* & Yiorgos Mkris Eletril Engineering Dept. Yle University New Hven, CT 62, USA Astrt Rewiring hs een used extensively for

More information

Published in: Wireless Communications and Networking Conference, IEEE WCNC 2009

Published in: Wireless Communications and Networking Conference, IEEE WCNC 2009 Alorg Universitet Cross-Lyer Optimiztion of Multipoint Messge Brodst in MANETs Nielsen, Jimmy Jessen; Grønæk, Lrs Jesper; Renier, Thiult Julien; Shwefel, Hns- Peter; Toftegrd, Thoms Pulished in: Wireless

More information

Towards a Language Based Synthesis of NCL. circuits

Towards a Language Based Synthesis of NCL. circuits Towrs Lnguge Bse Synthesis of NCL Ciruits Hemngee K. Kpoor, Ahinv Asthn, Toms Krilvičius, Wenjie Zeng, Jieming M n K Lok Mn Astrt This pper is n ttempt to provie lnguge front- to synthesise synhronous

More information

A Development of Embedded System for Speed Control of Hydraulic Motor

A Development of Embedded System for Speed Control of Hydraulic Motor AISTPME (2011) 4(4): 35-39 A Development of Embedded System for Speed Control of Hydruli Motor Pornjit P. Edutionl Mehtronis Reserh Group Deprtment of Teher Trining in Mehnil Engineering, KMUTN, ngkok,

More information

Algorithms for Memory Hierarchies Lecture 14

Algorithms for Memory Hierarchies Lecture 14 Algorithms for emory Hierrchies Lecture 4 Lecturer: Nodri Sitchinv Scribe: ichel Hmnn Prllelism nd Cche Obliviousness The combintion of prllelism nd cche obliviousness is n ongoing topic of reserch, in

More information

Patterns and Algebra

Patterns and Algebra Student Book Series D Mthletis Instnt Workooks Copyright Series D Contents Topi Ptterns nd funtions identifying nd reting ptterns skip ounting ompleting nd desriing ptterns numer ptterns in tles growing

More information

A Novel SVPWM Technology Used in PWM Rectifiers of WPGS

A Novel SVPWM Technology Used in PWM Rectifiers of WPGS Reserh Journl of Applie Sienes, Engineering n Tehnology 5(1): 4-45, 13 ISSN: 4-7459; e-issn: 4-747 Mxwell Sientifi Orgniztion, 13 Sumitte: Otoer, 1 Aepte: Novemer 9, 1 Pulishe: April 3, 13 A Novel SPWM

More information

Macroscopic and Microscopic Springs Procedure

Macroscopic and Microscopic Springs Procedure Mrosopi nd Mirosopi Springs Proedure OBJECTIVE Purpose In this l you will: investigte the spring-like properties of stright wire, disover the strethiness of mteril, independent of the size nd shpe of n

More information

Abdominal Wound Closure Forceps

Abdominal Wound Closure Forceps Inventor: Crlson, Mrk A. My 25, 2007 Adominl Wound Closure Foreps Astrt. The devie is modifition of stndrd tissue foreps for use during losure of dominl wounds mde for surgil proedure. The modifition onsists

More information

Positron Emission Tomography (PET) Images

Positron Emission Tomography (PET) Images Positron Emission Tomogrphy (PET) Imges Eh set of PET imges elow ontins four imges of humn rin. The four imges show ross-setions tken t ifferent levels of the rin. Set 1 Set 4 Set 5 Set 2 Set 6 Set 3 highest

More information

VOLTAGE SAG IMPROVEMENT BY PARTICLE SWARM OPTIMIZATION OF FUZZY LOGIC RULE BASE

VOLTAGE SAG IMPROVEMENT BY PARTICLE SWARM OPTIMIZATION OF FUZZY LOGIC RULE BASE VOL., NO. 7, PRIL 206 ISSN 89-6608 RPN Journl of Engineering nd pplied Sienes 2006-206 sin Reserh Pulishing Network (RPN). ll rights reserved. VOLTGE SG IMPROVEMENT Y PRTILE SWRM OPTIMIZTION OF FUZZY LOGI

More information

URL: mber=

URL:   mber= Wijnhoven, T.; Deonink, G., "Flexile fult urrent ontriution with inverter interfed distriuted genertion," in IEEE Power nd Energy Soiety Generl Meeting (PES), Vnouver, BC, Cnd, -5 July, 5 p. doi:.9/pesmg..66769

More information

Multivariable integration. Multivariable integration. Iterated integration

Multivariable integration. Multivariable integration. Iterated integration Multivrible integrtion Multivrible integrtion Integrtion is ment to nswer the question how muh, depending on the problem nd how we set up the integrl we n be finding how muh volume, how muh surfe re, how

More information

Double Integrals over Rectangles

Double Integrals over Rectangles Jim Lmbers MAT 8 Spring Semester 9- Leture Notes These notes orrespond to Setion. in Stewrt nd Setion 5. in Mrsden nd Tromb. Double Integrls over etngles In single-vrible lulus, the definite integrl of

More information

10.4 AREAS AND LENGTHS IN POLAR COORDINATES

10.4 AREAS AND LENGTHS IN POLAR COORDINATES 65 CHAPTER PARAMETRIC EQUATINS AND PLAR CRDINATES.4 AREAS AND LENGTHS IN PLAR CRDINATES In this section we develop the formul for the re of region whose oundry is given y polr eqution. We need to use the

More information

Section 6.1 Law of Sines. Notes. Oblique Triangles - triangles that have no right angles. A c. A is acute. A is obtuse

Section 6.1 Law of Sines. Notes. Oblique Triangles - triangles that have no right angles. A c. A is acute. A is obtuse Setion 6.1 Lw of Sines Notes. Olique Tringles - tringles tht hve no right ngles h is ute h is otuse Lw of Sines - If is tringle with sides,, nd, then sin = sin = sin or sin = sin = sin The miguous se (SS)

More information

A novel PLC channel modeling method and channel characteristic analysis of a smart distribution grid

A novel PLC channel modeling method and channel characteristic analysis of a smart distribution grid Le et l. Protetion n Control of Moern Power Systems (2017) 2:14 DOI 10.1186/s41601-017-0044-2 Protetion n Control of Moern Power Systems ORIGINAL RESEARCH A novel PLC hnnel moeling metho n hnnel hrteristi

More information

Kirchhoff s Rules. Kirchhoff s Laws. Kirchhoff s Rules. Kirchhoff s Laws. Practice. Understanding SPH4UW. Kirchhoff s Voltage Rule (KVR):

Kirchhoff s Rules. Kirchhoff s Laws. Kirchhoff s Rules. Kirchhoff s Laws. Practice. Understanding SPH4UW. Kirchhoff s Voltage Rule (KVR): SPH4UW Kirchhoff s ules Kirchhoff s oltge ule (K): Sum of voltge drops round loop is zero. Kirchhoff s Lws Kirchhoff s Current ule (KC): Current going in equls current coming out. Kirchhoff s ules etween

More information

Elettra Evolution OK! OK! b. User manual

Elettra Evolution OK! OK! b. User manual Elettr Evolution User mnul Pg. 1 INSTALLING THE SOLENOID VALVE. The progrmmle solenoi vlve is fully wtertight n will funtion even if instlle permnently uner wter t epth of up to one metre (IP68 ingress

More information

Multi-beam antennas in a broadband wireless access system

Multi-beam antennas in a broadband wireless access system Multi-em ntenns in rodnd wireless ccess system Ulrik Engström, Mrtin Johnsson, nders Derneryd nd jörn Johnnisson ntenn Reserch Center Ericsson Reserch Ericsson SE-4 84 Mölndl Sweden E-mil: ulrik.engstrom@ericsson.com,

More information

Study of WiMAX Based Communication Channel Effects on the Ciphered Image Using MAES Algorithm

Study of WiMAX Based Communication Channel Effects on the Ciphered Image Using MAES Algorithm Stuy of WiMAX Bse Communition Chnnel Effets on the Ciphere Imge Using MAES Algorithm Ahme G. Wy, Slim M. Wi, Hyer J. Mohmme Ali A. Aullh Communitions Tehs. Engineering Deprtment, Al-Furt Alwst Tehnil University,

More information

arxiv: v2 [cs.sy] 16 Nov 2012

arxiv: v2 [cs.sy] 16 Nov 2012 IEEE Personl use of this mteril is permitted Permission from IEEE must e otined for ll other uses, in ny urrent or future medi, inluding reprinting/repulishing this mteril for dvertising or promotionl

More information

Dataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1)

Dataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1) The slides contin revisited mterils from: Peter Mrwedel, TU Dortmund Lothr Thiele, ETH Zurich Frnk Vhid, University of liforni, Riverside Dtflow Lnguge Model Drsticlly different wy of looking t computtion:

More information

TRANSIENT VOLTAGE DISTRIBUTION IN TRANSFORMER WINDING (EXPERIMENTAL INVESTIGATION)

TRANSIENT VOLTAGE DISTRIBUTION IN TRANSFORMER WINDING (EXPERIMENTAL INVESTIGATION) IJRET: Interntionl Journl of Reserh in Engineering nd Tehnology ISSN: 2319-1163 TRANSIENT VOLTAGE DISTRIBUTION IN TRANSFORMER WINDING (EXPERIMENTAL INVESTIGATION) Knhn Rni 1, R. S. Goryn 2 1 M.teh Student,

More information

MATHEMATICS. Student Booklet

MATHEMATICS. Student Booklet GRADE 6 ASSESSMENT OF READING, WRITING AND MATHEMATICS, 2004 2005 Stuent Booklet MATHEMATICS Plese note: The formt of these ooklets is slightly ifferent from tht use for the ssessment. The items themselves

More information

Analog Input Modules

Analog Input Modules 7 922 nlog Input odules G56... nlog input modules for the ontrol of SQ5... ir dmper tutors y ontinuous nlog ontrol signls, suh s 4...20 m, nd ontinuous nlog position feedk signls. For supplementry Dt Sheets,

More information

AGA56... Analog Input Modules. Siemens Building Technologies HVAC Products

AGA56... Analog Input Modules. Siemens Building Technologies HVAC Products 7 922 nlog Input odules G56... nlog input modules for the ontrol of SQ5... ir dmper tutors y ontinuous nlog ontrol signls, suh s 4...20 m, nd ontinuous nlog position feedk signls. For supplementry Dt Sheets,

More information

Automatic Strategy Verification for Hex

Automatic Strategy Verification for Hex utomti Strtegy Verifition for Hex Ryn B. Hywrd, Broderik rneson, nd Philip Henderson Deprtment of Computing Siene, University of lert, Edmonton, Cnd {hywrd,roderi,ph}@s.ulert. strt. We present onise nd/or-tree

More information

The Nottingham eprints service makes this work by researchers of the University of Nottingham available open access under the following conditions.

The Nottingham eprints service makes this work by researchers of the University of Nottingham available open access under the following conditions. Remenyte-Presott, Rs nd Andrews, John (27) Prime implints for modulrised non-oherent fult trees using inry deision digrms. Interntionl Journl of Reliility nd Sfety, (4). pp. 446-464. ISSN 479-393 Aess

More information

Experiments for Leveled RFID Localization for Indoor Stationary Objects

Experiments for Leveled RFID Localization for Indoor Stationary Objects 2014 11th Interntionl Conferene on Informtion Tehnology: New Genertions Experiments for Levele RFID Loliztion for Inoor Sttionry Ojets Mtthew Chn Computer Systems Tehnology Dept. NYC College of Tehnology,

More information

Mixed CMOS PTL Adders

Mixed CMOS PTL Adders Anis do XXVI Congresso d SBC WCOMPA l I Workshop de Computção e Aplicções 14 20 de julho de 2006 Cmpo Grnde, MS Mixed CMOS PTL Adders Déor Mott, Reginldo d N. Tvres Engenhri em Sistems Digitis Universidde

More information

A New Algorithm to Compute Alternate Paths in Reliable OSPF (ROSPF)

A New Algorithm to Compute Alternate Paths in Reliable OSPF (ROSPF) A New Algorithm to Compute Alternte Pths in Relile OSPF (ROSPF) Jin Pu *, Eric Mnning, Gholmli C. Shoj, Annd Srinivsn ** PANDA Group, Computer Science Deprtment University of Victori Victori, BC, Cnd Astrct

More information

Balancing Your Life. Ideas that might help you

Balancing Your Life. Ideas that might help you Blning Your Life Ides tht might help you Pul Hoskin Summer 2007 Let s e honest if one lists off the responsiilities nd hoies tht eh of us hve nd ssigns weekly hourly time tht eh needs to e fulfilled, then

More information

WORKSHOP 15 PARASOLID MODELING

WORKSHOP 15 PARASOLID MODELING WORKSHOP 15 PARASOLID MODELING WS15-2 Workshop Ojetives Crete prsoli moel of tension fitting using numer of the prsoli tools in MSC.Ptrn WS15-3 Suggeste Exerise Steps 1. Crete new tse for the tension fitting

More information

by Kathy Brown of The Teacher s Pet

by Kathy Brown of The Teacher s Pet y Kthy Brown of The Teher s Pet Designs y Kthy Brown Pieing y Kthy Brown & Lin Ree Mhine quilte y Crol Hilton www.reroosterfris.om Quilte size: pproximtely 40" x 50" Fris from the Sprinkles (Style #4527)

More information

Main idea. Register Allocation. Interference graph. Register allocation. Interference graph. Interference graph

Main idea. Register Allocation. Interference graph. Register allocation. Interference graph. Interference graph Min i Rgistr Allotion Wnt to rpl tmporry vrils with som fix st of rgistrs First: n to know whih vrils r liv ftr h instrution Two simultnously liv vrils nnot llot to th sm rgistr (Slis from Anrw Myrs) Rgistr

More information

AT 500 V DC WITHSTANDING VOLTAGE: 1,000V RMS AT SEA LEVEL

AT 500 V DC WITHSTANDING VOLTAGE: 1,000V RMS AT SEA LEVEL TES M TM FOUR-WLL EER, SERIES " X " LOW PRILE, SURFE MOUNT, STRIGT N RIGT NGLE TROUG-OLE * LOW PRILE, SPE SVING ESIGN. * ENTER SLOT POLRIZTION PREVENTS MIS-INSERTIONS N REUES INSERTION TIME. * UL SLOT

More information

Comparison of Geometry-Based Transformer Iron- Core Models for Inrush-Current and Residual-Flux Calculations

Comparison of Geometry-Based Transformer Iron- Core Models for Inrush-Current and Residual-Flux Calculations omprison of Geometry-Bsed Trnsformer Iron- ore Models for Inrush-urrent nd Residul-Flux lultions R. Yonezw, T. Nod Astrt--When trnsformer is energized, oltge drop is osered due to the inrush urrents. An

More information

8.1. The Sine Law. Investigate. Tools

8.1. The Sine Law. Investigate. Tools 8.1 Te Sine Lw Mimi 50 ermud Tringle ermud 1600 km Sn Jun 74 Puerto Rio Te ermud Tringle, in te nort tlnti Oen, is te lotion of severl unexplined plne nd sip disppernes. Vrious teories ve een suggested

More information

Simulation of a zero-sequence relay for a distribution network with EMTP-RV Discrimination between fault current and magnetizing inrush current

Simulation of a zero-sequence relay for a distribution network with EMTP-RV Discrimination between fault current and magnetizing inrush current imultion of zero-sequene rely for distriution network with MTP-RV Disrimintion etween fult urrent nd mgnetizing inrush urrent M. Petit, P. Bstrd Astrt-- The zero-sequene relys re widely used to protet

More information

ITEC2620 Introduction to Data Structures

ITEC2620 Introduction to Data Structures /5/20 ITEC220 Introdution to Dt Strutures Leture 0 Gme Trees Two-Plyer Gmes Rules for gme define the sttespe Nodes re gme sttes Links re possile moves Build serh tree y rute fore Exmple I Exmple II A Our

More information

Global Register Allocation

Global Register Allocation Glol Rgistr Allotion Xiokng Qiu Puru Univrsity ECE 468 Slis from Anrw Myrs Sptmr 23, 2016 Min i Wnt to rpl tmporry vrils with som fix st of rgistrs First: n to know whih vrils r liv ftr h instrution Two

More information

WCCI FAIRIES

WCCI FAIRIES 1 1 st Prize JT «SuperProlem-10», 2016 Задача G12 xnxrx?x? Kx?x?x?x x?xpx?x? Px?x?x?x x?x?x?xk Rx?x?x?x h#2 2 solutions 1+6+5n AntiCire neutrl piees 6, e6, 4, g6, 5 - Nightrier (nn) 6,e6 - Equihopper (ne)

More information

An Intelligent Mobile-Based Automatic Diagnostic System to Identify Retinal Diseases using Mathematical Morphological Operations

An Intelligent Mobile-Based Automatic Diagnostic System to Identify Retinal Diseases using Mathematical Morphological Operations An Intelligent Moile-Bse Automti Dignosti System to Ientify Retinl Diseses using Mthemtil Morphologil Opertions Mohme Omr, Almgir Hossin, Li Zhng n Huert Shum Computtionl Intelligene Group, Deprtment of

More information

First Round Solutions Grades 4, 5, and 6

First Round Solutions Grades 4, 5, and 6 First Round Solutions Grdes 4, 5, nd 1) There re four bsic rectngles not mde up of smller ones There re three more rectngles mde up of two smller ones ech, two rectngles mde up of three smller ones ech,

More information

Parsing Permutation Phrases

Parsing Permutation Phrases Under onsidertion for pulition in J. Funtionl Progrmming 1 F U N C T I O N A L P E A R L Prsing Permuttion Phrses ARTHUR I. BAARS, ANDRES LÖH nd S. DOAITSE SWIERSTRA Institute of Informtion nd Computing

More information

Introduction 6 Basics 8 Projects 26. Stitching terms 94. About the author 95

Introduction 6 Basics 8 Projects 26. Stitching terms 94. About the author 95 Contents Klmh Books 21027 Crossros Cirle Wukesh, Wisonsin 53186 www.klmh.om/books 2010 Lesley Weiss All rights reserve. Exept for rief exerpts for review, this ook my not e reproue in prt or in whole y

More information

DETAIL A SCALE 1 : 85

DETAIL A SCALE 1 : 85 ISIONS ZONE LTR. ESRIPTION TE PP - INITIL RELESE PER N NORTH.0 0 EST ISOLTE P (0" X.") 0 9 0 X FOOKE # 0 ENTER ISOLTE P (" X 9") WEST ISOLTE P (0" X.") FOOKE # 0. RWING ONTENTS SHEET : OVERLL LYOUT SHEET

More information

IMPACCT: Methodology and Tools for Power-Aware Embedded Systems

IMPACCT: Methodology and Tools for Power-Aware Embedded Systems IMPCCT: Methodolog nd Tools for Power-wre Emedded Sstems Pi H. Chou, Jinfeng Liu, Dein Li, Nder Bgherzdeh, Deprtment of Eletril & Computer Engineering Universit of Cliforni, Irvine, C 92697-2625 US {hou,jinfengl,dli,nder}@ee.ui.edu

More information

Area-Time Efficient Digit-Serial-Serial Two s Complement Multiplier

Area-Time Efficient Digit-Serial-Serial Two s Complement Multiplier Are-Time Efficient Digit-Seril-Seril Two s Complement Multiplier Essm Elsyed nd Htem M. El-Boghddi Computer Engineering Deprtment, Ciro University, Egypt Astrct - Multipliction is n importnt primitive

More information

Notre Dame Tasks. Activity since last Telecon (Feb 7, 2011)

Notre Dame Tasks. Activity since last Telecon (Feb 7, 2011) Notre Dme Tsks tivity sine lst Teleon (Feb, ) Interfe Speifition beteen UWM/Dispth gent Frequeny estimtion simpoer omponent E-bord lod-shedding simpoer omponent Smrt-Sith simpoer omponent Single-phse Odyssin

More information

contents Once you learn a handful of stitches, you ll be amazed at the jewelry you can create and wear!

contents Once you learn a handful of stitches, you ll be amazed at the jewelry you can create and wear! ontents Introution... 4 Mterils n Tools... 5 Bsi Tehniques... 9 One you lern hnful of stithes, you ll e mze t the jewelry you n rete n wer! PEYOTE STITCH... 12 All Together Lether Tssel Errings...13 Angulr

More information

LORING THE SMARTER WAY TO ROAST PROPRIETARY ITEM:

LORING THE SMARTER WAY TO ROAST PROPRIETARY ITEM: TLE, MXIMUM WEIGHTS, L (KG) ROSTER (9) JOS TUING + (9.) GREEN EN RT + (.) EXHUST STK VENT UTO HOPPER.9.. 9.. ZONE TRIER UTO ISHRGE OOR PPROVE J HUTTON. 0....0 9. WLL TO. 0..0 0. REOMMENE LERNE.0. REOMMENE

More information

Interference Cancellation Method without Feedback Amount for Three Users Interference Channel

Interference Cancellation Method without Feedback Amount for Three Users Interference Channel Open Access Librry Journl 07, Volume, e57 ISSN Online: -97 ISSN Print: -9705 Interference Cncelltion Method without Feedbc Amount for Three Users Interference Chnnel Xini Tin, otin Zhng, Wenie Ji School

More information

Inclined Plane Walking Compensation for a Humanoid Robot

Inclined Plane Walking Compensation for a Humanoid Robot Incline Plne Wlking Compenstion for Humnoi Robot Nttpong Kewlek n Thvi Mneewrn Institute of Fiel Robotics, King Mongkut's University of Technology Thonburi, Bngkok, Thiln (Tel : +662-4709339; E-mil: k.nttpong@hotmil.co.th,

More information

(1) Non-linear system

(1) Non-linear system Liner vs. non-liner systems in impednce mesurements I INTRODUCTION Electrochemicl Impednce Spectroscopy (EIS) is n interesting tool devoted to the study of liner systems. However, electrochemicl systems

More information

MinCounter: An Efficient Cuckoo Hashing Scheme for Cloud Storage Systems

MinCounter: An Efficient Cuckoo Hashing Scheme for Cloud Storage Systems MinCounter: An Effiient Cukoo Hshing Sheme for Cloud Storge Systems Yunyun Sun Yu Hu Dn Feng Ling Yng Pengfei Zuo Shunde Co Wuhn Ntionl L for Optoeletronis, Shool of Computer Huzhong University of Siene

More information

Minimum Cost Localization Problem in Three-Dimensional Ocean Sensor Networks

Minimum Cost Localization Problem in Three-Dimensional Ocean Sensor Networks Minimm Cost Loliztion Prolem in Three-Dimensionl Oen Sensor Netorks Cho Zhng Yingjin Li Zhongen Go Goong Sn Y Wng Deprtment of Compter Siene, Uniersity of North Crolin t Chrlotte, Chrlotte, NC 8, USA.

More information

Triangles and parallelograms of equal area in an ellipse

Triangles and parallelograms of equal area in an ellipse 1 Tringles nd prllelogrms of equl re in n ellipse Roert Buonpstore nd Thoms J Osler Mthemtics Deprtment RownUniversity Glssoro, NJ 0808 USA uonp0@studentsrownedu osler@rownedu Introduction In the pper

More information

Geometric quantities for polar curves

Geometric quantities for polar curves Roerto s Notes on Integrl Clculus Chpter 5: Bsic pplictions of integrtion Section 10 Geometric quntities for polr curves Wht you need to know lredy: How to use integrls to compute res nd lengths of regions

More information

Supervisory control synthesis for a patient support system

Supervisory control synthesis for a patient support system Supervisory ontrol synthesis for ptient support system R.J.M. Theunissen, R.R.H. Shiffelers, D.A. vn Beek, nd J.E. Rood Astrt Supervisory ontrol theory (SCT) provides forml pproh to supervisory ontroller

More information

Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment

Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 1 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment Roerto Di Pietro, Luigi V. Mncini, nd Alessndro

More information