Date Notes


Expected Topics to be Covered
Sept. 7/11
461 outline
514 outline
network review
Introduction and review of networking concepts
Sept. 11/14/18
1.1-1.23 [notes]
Review of probability theory, random variables, CDF, PDF, PMF, and some common distributions
Sept. 21
1.24-1.30, 2.1-2.4 Discrete RVs, Random processes, Markov processes
Sept. 25
No lecture on Sept. 25, as it will be used for poster presentations on Nov. 30.
Sept. 28
3.1-3.5 [notes]
Markov chains
Oct. 2
3.6-3.13 Markov matrices

Assignment 1
Assignment 1 due date: Oct. 5
Oct. 5
4.1-4.12  [notes]
Steady state analysis of Markov chains
Steady state analysis using difference equations.
Google page rank.

Solution: assignment 1
Course presentation information
Oct. 9

Oct. 9 is Thanksgiving day.
For all students: Email me your selected topic(s), on/before Nov. 1.
Oct. 12/Oct. 16
7.1-7.6 [notes]
Queuing analysis, M/M/1, M/M/1/B queues

Assignment 2 Due date: Oct. 19

Solution: assignment 2

Oct. 19

Midterm Exam (during lecture time) [Previous Sample Exam]
Oct. 23/26
8.1, 8.2, 8.3 [notes]
Leaky bucket and token bucket
Oct. 30, Nov. 2
9.1-9.4 [notes] Error Control Protocols, SW ARQ, GBN ARQ, SR ARQ
Nov. 6
10.1-10.4 [notes] MAC Protocols, Pure ALOHA, Slotted ALOHA, Stability issue of ALOHA
Nov. 9
10.5, 10.6  [notes] CSMA/CD, CSMA/CA

Assignment 3
Due date: Nov. 16
Nov. 16
IEEE 802.11
Nov. 20
11.1, 11.2 [notes]
[Sample Questions]
Modeling Network Traffic, Poisson Process
Nov. 23
11.3, 11.5-11.8, 11.12, 11.13 Realistic models for Poisson traffic, Self-similar traffic, On-Off source/ Transmission error model

Solution: assignment 3

Assignment 4 Due date: Nov. 27
Nov. 27

Nov. 30
FUN Workshop, Nov. 30, 1 - 4pm, in ECS660

Session 1, 1:00-2:20pm
  1. Stock Price Analysis with Markov Chains, by Brandon Manz
  2. A comparison between two SDN controllers, by Fawaz alharbi
  3. Image ranking based on uniqueness, by Araya Chaowalit, Marina Ibrishimova, Ishu Tiwari
  4. Resource Scaling for Cloud Systems: An analysis, by Francois Lemieux
  5. Vehicle to Vehicle Safety Messaging in DSRC-The Future of Safer Driving, by Jaspreet Kaur, Harman Kaur, Ammar Bombaywala
  6. Indoor Localization: Your Phone Knows Where You Are, by Zehui Zheng
  7. VeMAC: A TDMA- bases MAC protocol for reliable broadcast in VANETs, by Navleen Kaur, Fernando Berra Kossik, Harshpreet Basra
  8. Implementation of Differentiated services based on Weighted Round Robin (WRR) and Priority queuing, by Atinder Preet Singh, Arun Kapoor, Amandeep Kaur
  9. Practical Applications of the Kruskal Count, by Riley Ledwon
  10. Performance of Reliable Transport Protocol over IEEE 802.11 Wireless LAN: Analysis and Enhancement, by Alice IRANKUNDA, Noel KHAEMBA
  11. Commercial Cloud Gaming, by Grant Tingstad
  12. The Kruskal Count, by Kareem Moeen
  13. Card Shuffles, by Raghav, Sahil, Pallavi
  14. The probability of success in RISK, by Tyler Selvig
  15. Localization and monitoring by RFID tags in cattle farming, by Syed Abdul Aleem, Sadiq Ali
  16. High-reliability Decoupling Capacitor Banks Analysis Using Markov Processi, by Abdul El-Shaarawi, Alexander Doknjas
  17. Voice capacity analysis of WLAN with unbalanced traffic, by Tessy K Achankunju, Riley Nabigon

  18. Session 2, 2:30pm -3:50pm

  19. Traffic Light Model, by Chelsea Reid, Geoff Hale
  20. Automated Ordering System using Priority Queue, by Rajiv Roy
  21. PRESS: PRedictive Elastic ReSource Scaling for cloud systems, by Darryl Ring
  22. Spatiotemporal Model for IoT Enabled LTE Networks: Combined Stochastic Geometry and Queueing Theory Model, by Mohammad Gharbieh
  23. Distributed and Adaptive Reservation MAC Protocol for Beaconing in Vehicular Networks, by Hamed Mosavat
  24. Predictive resource scaling for cloud computing, by Donovan McKillop
  25. Modelling and Analysing of IEEE 802.15.4 MAC Layer, by Ghazaal Behbood
  26. Gaming Data Analysis and Markov Chain, by Khashayar Ghaffari
  27. Modelling Deer Behaviour with Markov Chains, by Evan Bosdachin, Courtney Parker
  28. A Markov-Based Channel Model Algorithm for Wireless Networks, by Houssem MARZOUGUI, Sukhbani VIRDI, Simran KAUR
  29. Scaling an AWS DynamoDB Service, by Ashton Meuser, Jared Mann, Brandon Fong
  30. Checkout queue for grocery stores, by Mark Farrow, Haakon Sullivan
  31. TCP Congestion control with a misbehaving receiver, by Akash Panchal, Jay Shah, Brijesh Jethva
  32. Optimizing climbing gym with queueing analysis, by Alex Koszegi, Trevor Lee, Sally Sun
  33. Modelling and real-time performance analysis of a fast-food chain using M/M/x queue, by Uttej Reddy, K. Anirudh, Navnoor
  34. Predictive Policing, by Amr Talkhan, Anuraag Sinha
  35. A Review of Auto-Elastic Resource Scaling for Cloud Systems, by Onyekachienyinnaya Nwamuo, Chinonye Lynda Edbejimba, Wenli Huang
Wireless Multimedia Notes
TCP protocol and performance analysis of multimedia traffic in wireless networks

Solution: assignment 4

Dec. 15, 4pm

ELCE 514 Project report due
Final Exam: Open Book, FRI 08 DEC 9:00, HHB105

Course Info:  Info. from Sample chapters of the textbook can be downloaded from Springer: and the matlab code can be downloaded from Dr. Gebali's website:
Another reference book "Dimitri Bertsekas and Robert Gallager, Data Networks, Prentice Hall, Second Edition, 1992" can be downloaded at

Book helps to review probability:
Introduction to Probability Models, (0125980620), Sheldon M. Ross

DEADLINE for applying:
To hold an award for the period January - April 2017 applications must be submitted to Amy Issel, ECE Chair's Assistant by Friday, 21 October 2016 (no extensions).
Value of the award is $4500. Faculty members are required to supplement the award by at least 25%. Normal duration of the award is 16 consecutive weeks on a full-time basis.

Please see the attached document from the Office of Research Services and
[] for application forms (Form 202) and additional information.

The student will need to:

1. Log onto or Register as a new User on the NSERC site
( []).
2. Complete Form 202 Part I online. If you have completed this form online previously, you will
able to update the form. You may not create multiple versions of this form.
3. Print out a copy of the completed application and sign IN BLUE INK where indicated and attach
a copy of official transcripts from all post-secondary institutions EXCEPT UVic. Submit to potential supervisor.
4. Provide the reference number generated by NSERC's online system to your potential supervisor so the supervisor can complete Form 202 Part II.

Career News:

Tech News:  Intel HexaCore Processors:
Chief among these are the company's ongoing research into so-called "digital intelligence," high-speed point-to-point interconnects, and reconfigurable computing. Intel will also give more details on a 48-core single-chip processor it unveiled last December. One of the features the company will discuss is the chip's use of so-called circuit switching rather than packet switching when passing messages. By mapping out the route from core to core before actually sending a message, Intel claims it can vastly accelerate the speed at which information is passed within the chip structure.

Probability problems
  • Secretary_problem:
  • The Monty Hall problem can be solved using Bayes' theorem: see
  • Dollar cost averaging, myth or fact?

Hands-on book and simulation tool
    - Maria Luisa Merani, Maurizio Casoni, and Walter Cerrroni, Hands-on networking, from theory to practice
    - ns-3 Tutorial:
    - ns-2 Tutorial: