Routing and quality of service support for mobile ad hoc networks

Size: px
Start display at page:

Download "Routing and quality of service support for mobile ad hoc networks"

Transcription

1 Computer Networks 51 (2007) Routing an quality of service support for mobile a hoc networks Anelise Munaretto a,c, *, Mauro Fonseca b,c a CPGEI/UTFPR, Programa e Pós-grauação em Engenharia, Elétrica e Informática Inustrial, Av. 7 e setembro, 3165, Curitiba (PR), Brasil b PPGIA/PUC-PR, Bloco 2 Parque Tecnológico 2 anar, Rua Imaculaa Conceição, 1155, Prao Velho, CEP Curitiba (PR), Brazil c LIP6/Université e Paris VI, 104 avenue u Présient Kenney, Paris, France Receive 30 November 2005; receive in revise form 17 December 2006; accepte 28 December 2006 Available online 1 February 2007 Responsible Eitor: V.R. Syrotiuk Abstract OLSR is an optimization over classical link state protocols tailore for mobile a hoc networks. In this paper, we propose the QOLSR protocol which inclues quality parameters to the stanar OLSR. Three variants of QOLSR are introuce, taking into account the elay measurement together with the hop count metric. Then, we analyze new heuristics for the multipoint relay selection, an evaluate our propose approaches comparing them with the stanar OLSR protocol. Simulation results show that an increase loa-balancing an a reuce roppe packets rate are achieve ue to the inclusion of the elay information. Ó 2007 Elsevier B.V. All rights reserve. Keywors: A hoc networks; Routing protocols; QoS support; Delay metric 1. Introuction * Corresponing author. Aress: CPGEI/UTFPR, Programa e Pós-grauação em Engenharia, Elétrica e Informática Inustrial, Av. 7 e setembro, 3165, Curitiba (PR), Brasil. Tel.: aresses: anelise@cpgei.cefetpr.br (A. Munaretto), mauro.fonseca@ppgia.pucpr.br (M. Fonseca). The highly ynamic nature of a mobile a hoc network results in frequent an unpreictable changes in the network topology, increasing the complexity of routing among noes. Such challenges make routing probably the most active research topic within the MANET area. Besies the challenges associate with mobility, more ifficulties are introuce by the specific characteristics of the wireless channel. Broacast is the basic moe of operation over a wireless channel where, in general, each transmitte message can be receive by all neighbors locate within one-hop from the sener. In terms of traffic classification, in unicast the MAC layer is suppose to filter the messages an eliver them to higher layers those whose aress matches with the noe. When, broacast is use all neighbors that receive /$ - see front matter Ó 2007 Elsevier B.V. All rights reserve. oi: /j.comnet

2 A. Munaretto, M. Fonseca / Computer Networks 51 (2007) the message will forwar them to higher layers regarless of its aress, while the routing will forwar the messages to other noes. Such broacast traffic is often use by routing protocols for path iscovery. In this case, the simplest implementation of the broacast operation is by naive flooing, which may cause the broacast storm problem ue to reunant re-broacast [1]. Numerous routing protocols an algorithms have been propose. Their performance uner various network environments an traffic conitions have been extensively stuie an compare [2]. MANET routing protocols are typically subivie into two main categories: reactive on-eman routing protocols an proactive routing protocols. Reactive on eman routing protocols establish the route to a estination only when there is a eman for it. In proactive routing protocols routes are calculate before neee. Such protocols can be erive from either legacy Internet istance-vector or linkstate protocols. For mobile a hoc networks, the proactive routing protocols are table-riven, where each noe tries to maintain routing information about every other noe in the network at all times. An example of a proactive protocol is OLSR [3], which is an optimization over the classical link state protocol [4] (e.g. OSPF [5]). OLSR is now officially efine by the RFC 3626 of the IETF [6] in the Mobile A hoc NETworks (MANET) working group. It performs hop-by-hop routing, i.e., each noe uses its most recent information to route a packet. Therefore, each noe selects a set of its neighbor noes as MultiPoint Relays (MPRs) [7]. In the OLSR protocol, only the noes selecte as MPRs are responsible for forwaring control traffic, intene for iffusion to the entire network. MPRs provie an efficient mechanism for flooing control traffic that reuces the number of require transmissions. The MPRs are also responsible for eclaring the link state information over the network. However, no QoS information is taken into account, leaing to a non optimal path selection in terms of QoS requirements. In this paper we propose a QoS-enhancement for the OLSR protocol, which we efine as the QOLSR protocol. The QOLSR protocol extens the stanarize OLSR protocol [3], introucing QoS metrics to wireless an mobile a hoc networks. While the hop istance may be a vali metric for wire an stationary networks, it oes not consier the specifics of wireless links nor noe movement. We introuce three QOLSR variants of OLSR with ifferent traeoffs: QOLSR1, QOLSR2 an QOLSR3. The three variants QOLSR1, QOLSR2 an QOLSR3 are heuristics esigne for the selection of MPRs base on QoS parameters. The heuristic use in QOLSR1 selects as MPR the neighbor noe that can reach the largest number of noes (such a noe will have what we efine as the maximum reachability or egree). If there are two or more neighbor noes with the same reachability, then QOLSR1 prioritizes the neighbor with the smallest elay. The next heuristic is the one use in QOLSR2, which prioritizes the noe with the smallest elay when selecting the MPR noe. If there are two or more neighbors with the smallest elay, then the noe to be chosen as MPR will be the one with the largest reachability. The last propose heuristic, use in QOLSR3, selects as MPR the neighbor noe with the smallest elay among the neighbors that are, at most, within two hops from the initial noe. We emonstrate that QOLSR3 fins the optimal shortest path, in terms of elay, using only partial knowlege of the network topology. The remainer of this paper is organize as follows. A etaile specification of the QOLSR protocol is presente in Section 2, while in Section 3 we present its performance evaluation. In Section 4 we conclue the paper. 2. QOLSR 2.1. OLSR OLSR [3] is a proactive routing protocol that shares the stability of link state algorithms [4] an the avantage of having the routes immeiately available when neee. In pure link state protocols, all links within neighbor noes are eclare an control messages are flooe over the entire network. The OLSR protocol is an optimization of pure link state protocols (e.g. OSPF [5]) for mobile a hoc networks. First, it reuces the size of the control packets: instea of all links, it eclares only a subset of links within those neighbors that are in the MPR set [8]. Secon, it minimizes the flooing of control traffic by using only those noes within the MPR set to broacast its messages. Therefore, only MPRs of a noe rebroacast packets. This technique significantly reuces the number of retransmissions in a flooing or broacast proceure [7]. A etaile escription of the OLSR protocol can be foun in the RFC3626 [3].

3 3144 A. Munaretto, M. Fonseca / Computer Networks 51 (2007) Problem statement In the literature, as in [9], compulsory or guarantee services are sometimes also referre to as preicte or eterministic services, respectively. Deterministic service offers har QoS guarantees to all packets belonging to a ata stream. Preicte service is base on statistical bouns an provies weaker QoS guarantees than eterministic service, but stronger ones than best-effort service. Proviing a QoS service as oppose to a best-effort service is a very complex problem in MANETs [10]. A network s ability to provie QoS epens on the intrinsic characteristics of all network components, from transmission links to the MAC an network layers [11]. Such particular MANET characteristics generally lea to the conclusion that this type of network provies a weak support to QoS. Wireless links have time-varying capacity an larger loss rates than wire links. Topologies are highly ynamic with frequent link outage. Ranom access-base MAC protocols commonly use in this environment have no QoS support, e.g. the IEEE family. Moreover, MANET link layers typically run in unlicense spectrum, making it more ifficult to provie strong QoS guarantees. This scenario inicates that har QoS is extremely ifficult to guarantee in a MANET. If the noes have high mobility then even statistical QoS guarantees may be har to achieve ue to the lack of sufficient accurate knowlege of the network states. There is a growing consensus [12,13] that aaptive quality of service moels present the only viable approach to aressing the technical challenges associate with wireless networks. A more realistic approach for QoS provisioning in an a hoc network is base on an aaptive QoS moel where applications must aapt to the time-varying nature of the network. In [14], the efinition of the QoS moel for a MANET inclues a set of parameters that can aapt an application to the current quality of the network. The propose QOLSR protocol introuces quality parameters to the stanar OLSR protocol. Since the quality parameters are available before the routing table calculation, the QoS constraints can be verifie before the route selection. The applications can be aapte really knowing the quality that is expecte to be foun over the network. Therefore, an aaptive cross-layer QoS moel, incluing the application layer, must be propose to aapt the applications. However, this moel is out of the scope of this work. An aaptive QoS routing protocol proviing more appropriate metrics is alreay a consierable improvement in terms of achievable performance for mobile an wireless environment. In orer to esign a QoS routing protocol for MANETs base on a link state approach one shoul: (i) mitigate control traffic, which is the main rawback of proactive protocols; (ii) avoi oscillations an instabilities, which are typically generate by frequent changes on selecte routes; (iii) improve overall performance when compare with the stanar metric base on hop count Our proposal No aitional control messages are inclue for QOLSR. We benefit from Hello an TC messages to evaluate an maintain QoS information through the network. Nevertheless, to carry this QoS information, the format of Hello an TC messages must be change, which increases the size of these messages. In spite of that, the final control traffic loa is smaller than if new control messages were inclue. In Section 3 we evaluate the propose protocol in terms of control traffic. The QOLSR protocol aims to introuce more appropriate metrics for mobile a hoc networks. Many QoS parameters, e.g. banwith, one-way elay, en-to-en elay, energy, cost, jitter, packet loss probability, stability, etc., can be relevant in analyzing a wireless an mobile environment. However, the impact of each QoS parameter epens on the application requirements. We present how we measure these metrics an how these measurements are use as QoS metrics by QOLSR. These measure values are inclue in the QOLSR protocol functionalities. QOLSR oes not require any changes in the format of IP packets. Thus, any existing IP stack can be use an the protocol only interacts with routing table management. As in stanar OLSR, link state information is generate only by noes selecte as MPRs. This information is then use for route calculation in all noes Metric measurements This section presents QoS metrics an how we have esigne the measurement of these metrics Delay metric The first QoS parameter to be analyze is the oneway elay metric. Due to the fact that Hello messages are broacast in a controlle manner through the

4 A. Munaretto, M. Fonseca / Computer Networks 51 (2007) network, there is no acknowlegement of broacast messages. Consequently, we consier one-way elay rather than en-to-en elay. The measurement of the one-way elay avois the increase of traffic loa typically impose by the aition of extra messages to the QOLSR protocol in orer to estimate the en-to-en elay. However, for successful measurement of the one-way elay, a single global time axis is require. Clocks in a hoc networks, wireless networks an sensor networks, when synchronize via GPS [15], NTP [16], or any of many efficient synchronization protocols for wire as well as wireless meia [17 19], allow the assumption about an approximate, but sufficient, single global time axis. Thereby, base on the above consierations, we assume synchronize clocks. Finally, the assumption of a synchronize network simplifies the one-way elay calculation in the ubiquitous environment. During the neighbor iscovery performe by QOLSR, each noe generating a Hello message inclues its creation time. When a neighbor noe receives this message, it calculates the ifference between such a time an the current time, which represents the measure one-way elay. This measure one-way elay inclues the queuing time, the transmission time, the collision avoiance time, an the control overhea time. Moreover, such a measurement can rastically vary over time. However, it represents a relative measurement since is one using broacast messages rather than unicast messages as use by ata packets. Therefore, we opt for an estimate value avoiing the increase of the traffic control. Furthermore, we use the weighte average metho to accommoate varying elays by using an aaptive algorithm. Our metho is base on the RTT (Roun-Trip-Time) estimation in congestion avoiance an control [20] for TCP [21], which is useful for calculating weighte averages across multiple intervals. average elay ¼ a ol average elay þð1 aþmeasure elay where average_elay: represents the new weighte average, ol_average_elay: stores a weighte average, which is slowly change base on measure_ elay, measure_elay: compute from the elapse time between sening a Hello message an receiving it, 0 6 a 6 1: if a 0 then the formula makes weighte average immune to changes lasting a short time. Otherwise, if a 1 then the formula makes weighte average respon quickly to elay changes. In orer to make a traeoff between elay variations an path oscillations, we efine a threshol value, e.g. 10%. Then, a new average_elay is only compute if an only if the last measurement, i.e. measure_elay, is more than such a threshol value. Otherwise, we conserve the olest average elay without changing the elay measurement. More iscussion about the path oscillation problem is presente in Section Banwith metric The banwith measurement is epenent on the link layer technology. The IEEE technology is wiely use in testbes an simulations for wireless a hoc network research. Nevertheless, a hoc networks present even greater challenges than infrastructure wireless networks at the MAC layer [10]. For the sake of simplicity, an for calculating the available banwith, we consier the meium access control scheme escribe in IEEE b. The metho propose in this section calculates the available banwith between a given noe an its neighbors base on the work of Gerla an coworker [22], which by its turn consiers the acknowlegement time of the ata packets for measuring the banwith metric. Our propose metho inclues both ata packets an signalling traffic (e.g. Hello messages an TC messages in the OLSR protocol), since they also use the available banwith an must be taken into account. Suppose noe i an its neighbor noe j, then we efine the available banwith between them as follows: Bw ði;jþ ¼ð1 uþthroughput packet ði;jþ ; where u is the link utilization. The throughput seen by one packet of S bits can be calculate as: Throughput packet S ¼ t q þðt S þ t CA þ t overhea ÞRþ P R r¼1 B T where t q is the MAC queuing time, t S the time to transmit S bits, t CA the collision avoiance time, t overhea the control overhea time (e.g. RTS, CTS, etc), R the number of necessary transmissions, B T the backoff time for retransmission r. However, as shown in [22], this formula reveals some unesirable characteristics such as packet size

5 3146 A. Munaretto, M. Fonseca / Computer Networks 51 (2007) epenence an high variance ue to ranom per packet effects. To increase the statistical robustness of the measurements, a packet winow of 16 or 32 samples (packets) is shown to be aequate. To illustrate, authors in [22] show where the high variance per packets measurements are aggregate on a winow of 32 packets. In this case, the Link_throughput is the aggregate measurement of the Throughput_packet. The ile_time is the uration time uring which a noe is ile an the winow_uration represents the winow size. The ile_time an winow_uration are calculate to prouce the link utilization factor an the permissible throughput measurement as: Permissible throughput ile time ¼ Link throughput winow uration The a hoc network size is use to classify MANETs [10]. The scale of an a hoc network can be classifie as small-scale (i.e., 2 20 noes), moerate-scale (i.e., noes), large-scale (i.e., more than 100 noes), an very large-scale (i.e., more than 1000 noes). Many works [23] have presente possible manners to calculate the boun on throughput for a hoc networks. However, the achievable throughput can change ue to network conitions [24]. Moreover, the available banwith unergoes fast time-scale variations ue to channel faing an error from physical obstacles [25]. These effects are not present in wire networks. Then, to make estimation of available banwith an accurate throughput calculation in wireless networks are challenging tasks. Furthermore, the wireless channel is also a share-access meium, an the available banwith also varies with the number of hosts contening for the channel an their bit rates [26]. As a result of these challenges an ue to the instability of the banwith value in IEEE networks, we perform our simulations presente in this paper, consiering only the elay metric rather than the banwith metric. We exten upon earlier work in [27] by using a more realistic measurement of the quality of the network Selection of multipoint relays This section iscusses an presents QoS-base MPRs selection heuristics. We start efining the terminology use an presenting the stanar MPR selection efine in RFC3626 [3]. Afterwars, we propose new heuristics consiering QoS parameters when selecting MPRs Terminology Accoring to the RFC3626 an base on [28,29], if we consier elay metrics, the following terminology will be use in escribing QOLSR algorithms an heuristics: Neighbor of an interface: a noe is a neighbor of an interface if the interface (on the local noe) has a link to any one interface of the neighbor noe. 2-hop neighbors reachable from an interface: the list of two-hop neighbors of the noe that can be reache from neighbors of this interface. MPR set of an interface: a (sub)set of neighbors of an interface selecte such that through these selecte noes, all strict two-hop neighbors from that interface are reachable. N(x): N(x) is the subset of neighbors of the noe x, which are neighbors of its interface. N2(x): the set of two-hop neighbors reachable from the noe x. D(x,y): the egree of a one-hop neighbor noe y where y is a member of N(x), an is efine as the number of symmetric neighbors of noe y, excluing all members of N(x). Shortest path: a path with minimum elay, calculate by the source noe base on its known partial network topology. Optimal shortest path: the shortest path between two noes in the whole network topology. Any noe in the network can be selecte as an intermeiate noe in the optimal shortest path Stanar MPR selection Fining a MPR set with minimal size falls in the category of ominating set problems, which are known to be NP-complete. Demonstrations an proofs were etaile in [7]. The information neee to calculate MPRs is the set of one-hop neighbors an two-hop neighbors. The propose heuristic in [3] to calculate multipoint relay set of noe x is as follows: Step 1: Start with an empty multipoint relay set MPR(x). Step 2: Calculate D(x,y), "noes y 2 N(x). Step 3: First, select those one-hop neighbor noes in N(x) as multipoint relays which provie the only path to reach some noes in N2(x), an

6 A. Munaretto, M. Fonseca / Computer Networks 51 (2007) a these one-hop neighbor noes to the multipoint relay set MPR(x). Step 4: While there still exist some noes in N2(x) that are not covere by the multipoint relay set MPR(x): Step 4a: For each noe in N(x) which is not in MPR(x), calculate the number of noes that are reachable through it among noes in N2(x) an which are not yet covere by MPR(x). Step 4b: Select the noe from N(x) as a MPR that reaches the maximum number of uncovere noes in N2(x). Step 5: To optimize, remove each noe in MPR(x), one at a time, an check if MPR(x) still covers all noes in N2(x). The thir step permits to select some one-hop neighbor noes as MPRs which must be in the MPR(x) set, otherwise MPR(x) will not cover all two-hop neighbors. So these noes will be selecte as MPRs in the process, sooner or later. The heuristic use in the stanar OLSR protocol computes a MPR set of carinality at most log n times the optimal multipoint relay number, where n is the number of noes in the network [30]. The stanar OLSR heuristic limits the number of MPRs in the network, ensuring the overhea to be as low as possible. However, in QoS routing, by such a MPR selection mechanism, the goo quality links may be hien to other noes in the network. There is no guarantee that OLSR fins the optimal shortest path with respect to the elay metric. By example. From Fig. 1 we construct the Table 1 consiering the stanar OLSR heuristic: Base on the propose heuristic, noe m will select its MPRs as follows: The Step 3 of the heuristic oes not apply because all two-hop noes are reachable through more than one one-hop neighbor. Going to Step 4 of the heuristic, we have a tie, because noe a an noe j have the same reachability an the same egree. Then, we suppose that the noe a is ranomly selecte as an MPR. Therefore, MPR(m) = a. Then, the noes from N2(m) which are now covere by a noe in the MPR set are remove. The Step 4 is repeate while there exist noes in N2(m) which are not covere by at least one noe in the MPR set. s t v r i j Finally: MPR(m) =a, e, h, c. h a g x Now a constraints to the graph in Fig. 1; these are epicte in Fig. 2. When m is builing its routing table for estination x using the classical MPR heuristic, it will select the route (m,a,x) whose banwith is 15 kbps an the elay is 130 ms. The optimal shortest-wiest path between m an x is (m,j,x). It has 280 kbps as banwith an 24 ms as elay. The ecision on how each noe selects its MPRs is essential to etermine the optimal QoS route in the network. In the MPR selection, links with best QoS resources shoul not be omitte. We present in this section three heuristics for the MPR selection: QOLSR1, QOLSR2 an QOLSR3 consiering the minimum elay path QOLSR1 This heuristic is similar to the stanar MPR selection except when we have a tie, because noe a an noe j have the same reachability an the same egree. Then, rather than ranomly selecting an MPR, our heuristic chooses the one-hop m k Noe selecting MPR One-hop neighbor 2-hop neighbor Fig. 1. Example for the multipoint relay selection. Table 1 Example for multipoint relay selection Noe One-hop neighbor Two-hop neighbor MPR m a, b, c,, e, f, g, h, i, j s, v, x, y, z, w, q, k, r, t a, e, h, c f b e c q y w z

7 3148 A. Munaretto, M. Fonseca / Computer Networks 51 (2007) s t (100k, 10m) (1k, 600m) v (10k, 1 00m) (5k, 190m) (300k, 2m) (500k, 10 m) (1k, 410m) r i (500k, 10m) (1k, 250m) j h (400k, 10m) (900k, 9m) a g (15k, 1 10 m ) (280k, 15m) (90k, 5m ) (500k, 10m) (20k, 10m) x (400k, 10m) (30k, 20m) (300k, 20m) (1k, 10m) m (70 0k, 60 m) neighbor with the minimum elay path. The heuristic use in QOLSR1 prioritizes the minimum shortest path when selecting the MPR. Such a heuristic moifies the stanar MPR selection presente in Section by aing the Step 4c as follows: Step 4c: In case of a tie in the Step 4b, select the one-hop neighbor with the minimum elay path as MPR. There is no guarantee that QOLSR1 fins the optimal shortest path with respect to the elay metric. By example. From Fig. 2 we construct the Table 2 consiering the QOLSR1 heuristic: Applying this heuristic, when m is builing its routing table, for estination y, it selects j, e, c, an h MPRs. It will select the route (m,c,y) whose elay is 50 ms. The optimal shortest path between m an y is (m,b,y). It has 20 ms as elay. ( 10 k, 60 m ) k Noe selecting MPR One-hop neighbor 2-hop neighbor Constraints = (bw, elay) f b (150k, 10m) (10k, 400m) (300k, 40m) (10 0k, 90m) (130k, 20m) (100k, 100m) (4k, 10m) e c (400k, 30m) (100k, 10m ) q y (100k, 1 0m) (80k, 1m) (40 0k, 3 m ) (200k, 100 m) (100k, 10m) (120k, 50m) (300k, 20m) Fig. 2. Example for the multipoint relay selection consiering QoS constraints. w z QOLSR2 The heuristic use in QOLSR2 prioritizes the minimum elay path metric rather than the reachability or the egree. After, if there is more than one MPR with the same minimum elay path, then the MPR with the maximum reachability shoul be chosen. Such a heuristic moifies the Step 4.b an as the Step 4c of the stanar MPR selection presente in Section as follows: Step 4b: Select the one-hop neighbor with the minimum elay path as MPR. Step 4c: In case of a tie in the Step 4b, select the noe from N(x) as a MPR that reaches the maximum number of uncovere noes in N2(x). There is no guarantee that QOLSR2 fins the optimal shortest path with respect to the elay metric. By example. From Fig. 2 we construct the Table 3 consiering the QOLSR2 heuristic: Applying this heuristic, when m is builing its routing table, for estination z, it selects i, h, b, j, e an c MPRs. It will select the route (m,c,z) whose elay is 140 ms. The optimal shortest path between m an z is (m,,z). It has 100 ms as elay QOLSR3 QOLSR3 selects as the MPR the neighbor noe the one with the smallest elay among the neighbors that are, at most, within two hops from the initial noe. Thus, it moifies Step 4b, inclues the new Step 4c, an removes Step 5 from the MPR selection algorithm of the stanar OLSR protocol, as presente in Section The propose algorithm, incluing the above moifications, is presente next: Step 4b: Select the noe of N(x) as a MPR, which has the minimum elay path consiering N(x) an N2(x). Step 4c: In case of a tie in the Step 4.b, select the noe which reaches the maximum number of uncovere noes in N2(x). Claim 1. Consier the case when each ege is given an arbitrary nonnegative elay (length). In this case, the total elay of this path is efine to be the sum of the elays of its eges. In Fig. 3, we efine p[s,] to be a shortest path from s to ; that is: Table 2 MPR selecte in the QOLSR1 Table 3 MPR selecte in the QOLSR2 Noe MPR Noe MPR N j, e, c, h m i, h, b, j, e, c

8 A. Munaretto, M. Fonseca / Computer Networks 51 (2007) v 1 v i v j s u 1 u u u i+1 u u i-1 j-1 j+1 u k u i u j Fig. 3. Optimal shortest path from s to. p ¼ðu 1 ;...; u i 1 ; u i ; u iþ1 ;...; u j 1 ; u j ; u jþ1 ;...; u k Þ is an optimal shortest path, for k P 3. For any intermeiate noe u i (i 5 1) in p that is not selecte as MPR by its previous noe u i 1, we can fin a noe v i selecte as MPR by u i 1 such as the path (u 1,...,u i 1,v i,u i+1,...,u k ) has at least the same total elay. Proof. Let p =(u 1,...,u i 1,u i,u i+1,...,u k ), k P 3 an optimal shortest path from u 1 to u k, as epicte in Fig. 3. Suppose that on the optimal shortest path, the noe u i is not selecte as MPR by its previous noe u i 1. We can assume that for each noe on the path, its next noe in the path is its one-hop neighbor, an the noe two hops away from it is its two-hop neighbor. Base on the basic iea of the MPR selection that all two-hop neighbors of a noe shoul be covere by this noe s MPR set, u i 1 must have another neighbor v i, which is selecte as its MPR, an is connecte to u i+1. Let p 0 =(u 1,..., u i 1,v i,u i+1,...,u k ), k P 3. Accoring to the criteria of MPR selection specifie on QOLSR3, wherein the metric is the elay over two-hops, then u i 1 selects v i instea of u i as its MPR because: elay ðui 1 v iu iþ1 Þ 6 elay ðui 1 u iu iþ1 Þ ð1þ From Eq. (1) we have elay(p 0 ) 6 elay(p). Base on this assumption, if path p is an optimal shortest path, path p 0 is also an optimal shortest path. Claim 2. There is an optimal shortest path in the whole network such that all the intermeiate noes are selecte as MPR by their previous noes. Proof. By a recurrence. Let p =(s,u 1,...,u i 1,u i, u i+1,...,u j,...,u k,), j < k an optimal shortest path as epicte in Fig. 3. i. By Claim 1, the first intermeiate noe u 1 is selecte as MPR by source s. Then, we can fin a noe v 1 selecte as MPR by s such that the path p 0 =(s, v 1,..., u i 1, u i, u i+1,..., u j,...,u k,) has the same total elay of the optimal path. Then, p 0 is also an optimal shortest path. So, the source s MPRs are on the optimal shortest path. ii. We assume that all the noes u 1,...,u i 1, u i,u i+1,...,u k are selecte as MPRs by their previous noe in the path p. We prove that the next hop noe of u i on p is u i s MPR. Suppose that u j+1 is not an MPR of u j. As above, by using the Claim 1, we can fin a noe v j+1 selecte as MPR by u j such that the path p 0 =(s,u 1,...,u i 1,u i,u i+1,...,u j,v j+1,...,u k, ) has at least the same total elay of the optimal shortest path; then p 0 is also an optimal shortest path. So, in an optimal shortest path, the (j + 1)th intermeiate noe is the MPR of the (j)th intermeiate noe. Base on i. an ii., all intermeiate noes of an optimal shortest path are MPRs of previous noes. By Claim 2, there is an optimal shortest path such that all intermeiate noes are the MPRs of previous noes on the same path. So the optimal shortest path for the whole network topology is inclue in the partial topology the noe knows. Using a shortest path algorithm, as Dijkstra s algorithm [28], we can compute the optimal shortest path in the partial network topology. We can conclue that QOLSR3 fins the optimal shortest path. QOLSR3 fins the optimal shortest path using only partial knowlege of the network topology. The heuristic use in the QOLSR3 fins exactly optimal MPRs that guarantee minimum elay path. Nevertheless, there is no guarantee that this heuristic fins the minimum MPR set an also there is no optimization of the number of MPRs as one in Step 5 of QOLSR1 an QOLSR2 heuristics. Table 4 summarizes all propose heuristics for the MPR selection comparing to the stanar MPR selection of OLSR. In Section 3, we simulate three propose QOLSR selection heuristics using the elay metric an

9 3150 A. Munaretto, M. Fonseca / Computer Networks 51 (2007) Table 4 Propose MPRs heuristics Heuristic First metric Stanar MPR selection Secon metric Degree None Yes QOLSR1 Degree Delay Yes QOLSR2 Delay Degree Yes QOLSR3 Delay Degree No compare them with the OLSR protocol. In following section, we present the routing table calculation performe by QOLSR Routing table calculation In traitional ata networks, routing protocols usually characterize the network with a single metric such as hop-count or elay, an use the shortest path algorithms for path computation. For the elay metric, each arc (i, j) in the path p where p =(i,j,k,...,q,r) is assigne a real number elay ij. When the arc (i,j) is nonexistent, then elay ij = 1. Let elay(p)=elay ij + elay jk + + elay qr.the routing problem is to fin a path p* between i an r so that elay(p*) is the minimum. In such a case, we use Dijkstra s shortest path algorithm Path oscillation problem Minimization of the MPR set The consistent elivery of QoS guarantees requires stability of the ata path. In particular, while it is possible that after a path is first selecte, network conitions change an result in the appearance of new better paths, such changes shoul be prevente from unnecessarily affecting existing paths. In particular, switching over to a new (an better) path shoul be limite to specific conitions, e.g., when the initial selection turns out to be inaequate or extremely expensive. This aspect is beyon the scope of QoS routing an belongs to the realm of path management, which is outsie the main focus of this paper. However, because of its potentially significant impact on the usefulness of QoS routing, we briefly outline a possible approach to path management, accoring to [31]. In orer to reuce oscillations between paths, we introuce a threshol value. The basic iea is to trigger path selection only when there is a significant change in the value of metrics compare to last metric measurement. The notion of significance of a change can be base on an absolute scale or a relative one. Accoring to [31], an absolute scale means partitioning the range of values that a metric can take into equivalence classes an triggering an upate whenever the metric changes sufficiently to cross a class bounary. A hysteresis mechanism may be ae to suppress upates when the metric value oscillates aroun a class bounary. OLSR efines a Link Hysteresis strategy escribing quality of the link that mitigates oscillations among paths. A relative scale, on the other han, triggers upates when the percentage change in the metric value excees a preefine threshol. Inepenent of whether a relative or an absolute change trigger mechanism is use, a perioic trigger constraint can also be ae. This constraint can be in the form of a hol-own timer, which is use to force a minimum spacing between consecutive upates. Alternatively, a transmit timer can also be use to ensure the transmission of an upate after a certain time has expire. Such a feature can be useful if link state upates avertising banwith changes are sent unreliably. The QOLSR path selection, propose in this paper, uses a relative scale, setting the threshol value to a preefine percentage. The strategy is: the metric measurement is only taken into account if an only if such a measurement excees a preefine threshol. Such a strategy mitigates oscillations an instabilities, which are typically generate by frequent changes on selecte routes. Nevertheless, since the path oscillation problem involves path management, it is not completely solve only using our proposal, which o not inclue a path management. 3. Performance analysis The performance of the QOLSR protocol is stuie with simulations. QOLSR has been implemente with OPNET moeler [32]. It is particularly popular in the a hoc networking community, an many protocols use in a hoc networks have been implemente, incluing Wireless LAN MAC layer IEEE protocol, an some routing protocols such as AODV, DSR an TORA. Our implementation inclues the OLSR moule over the Wireless Moule an QOLSR functions. We evelope the OLSR protocol as specifie in RFC3626. The implementation is completely moular an esigne in compliance with other MANET protocols specifie for raio/wireless moels. In this way, such a moularity guarantees an easy

10 A. Munaretto, M. Fonseca / Computer Networks 51 (2007) evaluation among MANET protocols an increases the accuracy in results while we use stanar OPNET moels. The MAC layer an PHY layer of the OPNET wireless moel are esigne base on the IEEE stanar [33]. Although the MAC implementation is not complete, it supports most of IEEE stanar functionalities, such as the back-off, eference, RTS/CTS, NAV, frame exchange sequence, fragmentation, access point functionality, basic service set, lost frame retransmission, an uplicate frame etection, etc. Both DCF moe an PCF moe are supporte. In aition, OPNET supports the b physical layer moel [33]. Both PLCP preamble an PLCP heaer are implemente an the multirate support is provie. There are three choices for the physical layer configuration in IEEE stanar: frequency hopping, infra re, an irect sequence. In our simulation scenario, we have selecte the Direct Sequence Sprea Spectrum (DSSS) technology. The configuration of the mobile stations is mostly base on the efault parameter values propose for the DSSS system in IEEE b stanar [34], like the length of RTS, CTS, ACK, MAC heaer, the slot time, the SIFS, the DIFS, the PLCP preamble, etc. To provie the higher rates, 8-chip complementary coe keying (CCK) is employe as the moulation scheme Simulation: mobile network scenario Table 5 Parameters use in the simulations Parameter Value Transmission rate (Mbps) 11 QOLSR a Varying between 0.3 an 0.7 Packet size (bytes) 64 Inter-arrival time (s) Varying between 1 s an s Number of noes 30 Mobility moel Ranom waypoint mobility moel Network area (m m) 1500 m by 300 m Default istance (m) 100 Maximum istance (m) 300 The main parameters use in simulations are given in Table 5. Networks of 30 noes are generate, where noes roam in an area of 1500 m by 300 m. The mobility moel use is the ranom waypoint mobility moel efining the way users move in the simulate area [35]. Network mobility is varie by changing the maximal noal spee v max = 10 m/s. The spee value is varie between 0 an 10 m/s to moel ifferent mobility. In such a moel, each noe picks a ranom estination in the efine area, sample a spee value. Once the noe arrives at its estination, it pauses for a time p = 100 s. The network loa is varie by changing the inter-arrival time of packets accoring to Table 5 parameters. The uration of the simulation is 300 s. Network traffic is generate by a traffic generating source, where the source an the estination are chosen ranomly. This traffic generating source generates packets with 64 bytes. The time between successive traffic generations varies following a specifie value. Such a value is varie changing the packet interarrival time between 1 an , i.e. sources generate packets at a rate varying between 1 an 360 packets/s, varying the network loa ynamically. All noes are traffic generate sources. In orer to assess the improvement achieve in QoS support capability by incorporating our algorithms to the original OLSR protocol, we implement three ifferent heuristics for the MPR selection functionality. The implemente heuristics consiering the minimum elay path are QOLSR1, QOLSR2 an QOLSR3 as etaile in Section Then, we compare simulation results from the original best-effort OLSR protocol an our three QOLSR variants. Simulation results presente are base on a single metric for the routing calculation, i.e. the minimum en-to-en elay. Nevertheless, we have esigne the routing ecision (i.e. the metric use for the routing calculation) as well as QOLSR heuristics as simulation parameters. Then, for each simulation we can specify the metric use an the QOLSR heuristic propose. Other implementations have been one using multiple-metrics, i.e. banwith an elay, for the routing calculation in [27]. The reason that we choose the elay constraint in our simulations, as iscusse in Section 2.4.2, to calculate the available banwith for each noe is still a challenging task. We believe that the elay constraint reflects a more realistic measurement of the quality of the network Simulation results The next figures show the relative performance of the routing algorithms OLSR, QOLSR1, QOLSR2, an QOLSR3. For each simulate routing algorithm, the QOLSR parameter a was varie within the set [0.3,0.4, 0.5,0.6, 0.7]. Results for a = 0.8 an a = 0.9 are not shown because for these values the algorithms become unstable an strongly scenarioepenent.

11 3152 A. Munaretto, M. Fonseca / Computer Networks 51 (2007) Fig. 4 epicts the number of receive packets/sec for each simulate protocol. From the figure we can see that uner light traffic, i.e. 50 packets/s, the number of receive packets is about the same for all cases. This occurs because uner light traffic the elay measurements present no significant variation to inuce the selection of a new path. Therefore, as the main ifference between QOLSR an OLSR is the inclusion of the elay metric, there is no consierable ifference between their performance for the case of light traffic. In the case of more than 100 packets/s, the avantages of the propose QOLSR protocols become apparent. Note that the greater is a, the lower is the weight of the last measure elay, i.e. the instantaneous elay. In this case, the instability cause by the instantaneous elay has little influence in the network behavior. For heavy traffic, i.e. more than 350 packets/s, QOLSR3 with a = 0.7 elivers fewer receive packets than QOLSR3 with a = 0.3. This can be explaine because when a = 0.3, an uner heavy traffic, the weight of the last elay measurement is large an therefore the protocol change routes very often. The increase in the traffic increases the en-to-en elay, giving rise to path instability. For heavy traffic, the best results were achieve in the case of QOLSR1 with a = 0.7, where the improvement when compare with stanar OLSR is aroun 12%. Finally, as a benchmark, in the figure we also plot a line representing the maximal values, i.e. the ieal values, where 100% of the transmitte packets are receive with zero roppe packets. Fig. 5 shows the average number of roppe packets/s for each simulate protocol. The number of roppe packets/s is consierably ecrease for all QOLSR variants when compare with stanar OLSR. The best performance was achieve for QOLSR1 with a = 0.7, where the packet loss is 58% smaller than for OLSR. Table 6 summarizes the gains of the QOLSR variants with respect to stanar OLSR. Fig. 6 presents the average packet elay for each protocol. At an arrival rate of uner 200 packets/s, QOLSR1 an QOLSR2 achieve a smaller average elay when compare with OLSR. In the plot we zoom in on the range between 30 an 220 packets/ s which make more clear the gain of the propose QOLSR protocols for that range. Uner light traffic, the best results are achieve by QOLSR1, followe by QOLSR2. From the figure we can also see that the relative performance changes epening on the traffic conition (after 220 packets/s). We have emonstrate in Section that QOLSR3 fins the optimal path with respect to the elay metric. However, in our simulations we fin that QOLSR3 generates more instability in the paths because such a protocol reacts more to the traffic variation, increasing the total average elay. Moreover, the goo performance achieve OLSR Maximal QOLSR1 (alpha=0.7) QOLSR2 (alpha=0.7) QOLSR3 (alpha=0.3) QOLSR3 (alpha=0.7) 300 Receive (packets/sec) Transmitte (packets/sec) Fig. 4. Comparison of the average of receive packets/s.

12 A. Munaretto, M. Fonseca / Computer Networks 51 (2007) OLSR QOLSR1 (alpha=0.7) QOLSR2 (alpha=0.7) QOLSR3 (alpha=0.7) 60 Droppe (packets/sec) Transmitte (packets/sec) Fig. 5. Comparison of the number of roppe packets/s. Table 6 Traffic roppe: the gain achieve for each simulate QOLSR protocol comparing with OLSR Protocol Gain achieve (%) QOLSR1 ( ) QOLSR2 ( ) QOLSR3 ( ) by OLSR in Fig. 6 can be explaine by the fact that in OLSR the number of roppe packets is larger than in the QOLSR protocols, an that such roppe packets are not taken into account in the average elay calculation. Then, when a packet is not roppe an is elivere with a large elay, the total average elay is increase. However, by OLSR QOLSR1 (alpha=0.6) QOLSR1 (alpha=0.7) QOLSR2 (alpha=0.4) QOLSR2 (alpha=0.7) QOLSR3 (alpha=0.5) QOLSR3 (alpha=0.6) Delay (sec) Transmitte (packets/sec) Fig. 6. Comparison between three propose QOLSR algorithms of the average packet elay.

13 3154 A. Munaretto, M. Fonseca / Computer Networks 51 (2007) OLSR QOLSR1 (alpha=0.7) QOLSR2 (alpha=0.4) QOLSR2 (alpha=0.7) QOLSR3 (alpha=0.3) QOLSR3 (alpha=0.5) Cumulative probability (%) Delay (s) Fig. 7. CDF of packets elay. the same fact, QOLSR increases the network reliability. In orer to investigate in etail why the average elay is reuce, we consier the cumulative istribution function (CDF) of packet elays. Fig. 7 shows the CDF of packet elays for a traffic loa of 300 packets/s. In the figure zoom in on the range of 0 50%. From the figure we can see that all QOLSR protocols present better results than the stanar OLSR protocol. We note that QOLSR3 achieves the largest elay reuction, about 44% less than OLSR. In the range of 60 95% in the CDF, the smallest elays are achieve by QOLSR1 with a = 0.7. For more than 95%, the best results are achieve by QOLSR2. The avantage of the three QOLSR variants over the stanar OLSR protocol becomes evient when traffic gets heavy. Specifically, QOLSR3 achieves the best result ue to its inherent improvement in the loa-balance over the whole network. However, this improve loa istribution is achieve through the increase of the MPR set, reflecte in a increase in the control traffic over the network. For the case of light traffic, the performance results for the three propose schemes are very similar, since in this case the routes are more stable. However, we can say that QOLSR1 an QOLSR2 have slightly better performance uner light traffic because they minimize the MPR set an consequently generate less traffic control than QOLSR3. 4. Conclusions This article presente a QoS-base routing protocol for mobile an wireless a hoc networks. In orer to inclue quality parameters in the routing information, QoS measurements were applie. Methos to calculate elay an banwith measurements were propose. The elay metric is calculate between each noe an its neighbors having irect an symmetric links. The banwith measurements are calculate using IEEE b as the meium access control protocol. However, the throughput is very instable ue to network conitions. Accurate throughput calculation is still a challenging task. Therefore, we consiere elay as a metric rather than banwith as a metric. The implications of routing metrics on path computation were examine an the rationale behin the selection of QoS metrics were iscusse. Heuristics for multipoint relays selection were propose. The heuristic use in stanar OLSR fins a MPR set with minimal size. However, there is no guarantee that OLSR fins the optimal path consiering QoS constraints. Thus, three variants that allow QOLSR to fin the minimum elay path were propose. In orer to inclue quality requirements in the MPRs selection, an also in routing information, elay measurements are applie. We emonstrate that the QOLSR3 heuristic fins the

14 A. Munaretto, M. Fonseca / Computer Networks 51 (2007) optimal shortest paths using only partial knowlege of the network topology. The performance of the propose QOLSR variants were examine through computer simulations. The three QOLSR variants achieve better performance when compare with the stanar OLSR protocol. Finally, the propose work can be use to aapt protocol functionalities such as route selection. It woul even be possible to support aaptive applications, such as multimeia, which are sensitive to network changing conitions. Acknowlegements This work is supporte by CNPq. The authors woul like to thank Richar Demo Souza for his revision of the text, an the eitor an the anonymous reviewers for their contributions that enriche the final paper. References [1] S.-Y. Ni, Y.-C. Tseng, Y.-S. Chen, J.-P. Sheu, The broacast storm problem in a mobile a hoc network, in: ACM/IEEE SIGCOMM, Seattle, [2] E. Beling-Royer, C. Toh, A review of current routing protocols for a-hoc mobile wireless networks, IEEE Personal Communications (1999) [3] T. Clausen, P. Jacquet, Optimize Link State Routing Protocol (OLSR), IETF, RFC 3626, October [4] M. Steenstrup, Routing in Communication Networks, Prentice Hall International Inc., Englewoo Cliffs, [5] J. Moy, OSPF Version 2, IETF, RFC 2328, April [6] Mobile A-hoc Networks IETF working group, Available from: [7] A. Qayyum, L. Viennot, A. Laouiti, Multipoint relaying technique for flooing broacast message in mobile wireless networks, in: HICSS: Hawaii International Conference on System Sciences, Hawaii, [8] T. Clausen, P. Jacquet, A. Laouiti, P. Muhlethaler, A. Qayyum, L. Viennot, Optimize link state routing protocol, in: IEEE INMIC, Pakistan, [9] J. emeer, A. Eberlein, Towars an avance qos architecture, in: Multimeia Internet Broacasting, Springer-Verlag, [10] I. Chlamtac, M. Conti, J.-N. Liu, Mobile a hoc networking: imperatives an challenges, Elsevier A Hoc Journal 1 (1) (2003) [11] R. Ramanathan, M. Steenstrup, Hierarchically-organize, multihop mobile wireless networks for quality-of-service support, ACM/Baltzer Mobile Networks an Applications 3 (1) (1998). [12] G. Bianchi, A. Campbell, R. Liao, On utility-fair aaptive services in wireless networks, in: IEEE IWQOS 98, Napa Valley, CA, [13] M. Naghshineh, M. Willebeek-LeMair, En-to-en QoS provisioning in multimeia wireless/mobile networks using an aaptive framework, IEEE Communications Magazine 35 (11) (1997) [14] N. Nikaein, C. Bonnet, A glance at quality of service moels in mobile a hoc networks, in: DNAC 2002, Paris, [15] T. Logson, The Navstar Global Positioning System, Van Nostran Reinhol, New York, [16] D.L. Mills, Internet time synchronization: The network time protocol, in: Zhonghua Yang, T. Anthony Marslan (Es.), Global States an Time in Distribute Systems, IEEE Computer Society Press, [17] K. Roemer, Time synchronization in a hoc networks, in: ACM MobiHoc, Long Beach, [18] W. Su, I. Akyiliz, Time-iffusion synchronization protocol for sensor networks, IEEE/ACM Transactions on Networking 13 (2) (2005) [19] A. Munaretto, M. Fonseca, K.A. Agha, G. Pujolle, Virtual time synchronization for multimeia a hoc networks, in: IEEE VTC 2004-Fall, 2004, Los Angeles. [20] V. Jacobson, M.J. Karels, Congestion avoiance an control, in: ACM SIGCOMM, Stanfor, [21] J. Postel, Transmission Control Protocol, IETF, RFC 793, September [22] M. Kazantziis, M. Gerla, En-to-en versus explicit feeback measurement in networks, in: IEEE Symposium on Computers an Communications, Taormina, [23] P. Gupta, P.R. Kumar, The capacity of wireless networks, IEEE Transactions on Information Theory IT-46 (2) (2000) [24] M. Grossglauser, D. Tse, Mobility increases the capacity of ahoc wireless networks, IEEE/ACM Transactions on Networking 10 (4) (2002) [25] S.H. Shah, K. Chen, K. Nahrstet, Available banwith estimation in IEEE base wireless networks, in: 1st ISMA/CAIDA Workshop on Banwith Estimation, San Diego, [26] M. Heusse, F. Rousseau, G. Berger-Sabbatel, A. Dua, Performance anomaly of b, in: IEEE INFOCOM, San Francisco, [27] H. Bais, A. Munaretto, K.A. Agha, G. Pujolle, QoS for a hoc networking base on multiple metrics: banwith an elay, in: The Fifth IFIP International Conference on Mobile an Wireless Communications Networks, Singapore, [28] M.J. Atallah, Algorithms an Theory of Computation Hanbook, CRC Press, [29] Z. Wang, J. Crowcroft, Quality-of-service routing for supporting multimeia applications, IEEE Journal of Selecte Areas in Communications 14 (7) (1996) [30] A. Qayyum, L. Viennot, A. Laouiti, An efficient technique for flooing in mobile wireless networks, Research Report 3898, INRIA, June [31] G. Apostolopoulos, D. Williams, S. Kamat, R. Guerin, A. Ora, T. Przygiena, QoS routing mechanisms an OSPF extensions, IETF, RFC 2676, August [32] OPNET Moeler, Available from: [33] OPNET Technologies, Wireless LAN Moel Description, November [34] IEEE Stanar, November [35] J. Broch, D.A. Maltz, D.B. Johnson, Y.-C. Hu, J. Jetcheva, A performance comparison of multi-hop wireless a hoc network routing protocols, in: ACM/IEEE MobiCom, Dallas, 1998.

15 3156 A. Munaretto, M. Fonseca / Computer Networks 51 (2007) Anelise Munaretto is currently Associate Professor at the Feeral Technologic University of Paraná (UTFPR), Curitiba-PR, Brazil. She was grauate from the Pontifical Catholic University of Paraná (PUC-PR), Curitiba-PR, Brazil with a B.Sc. in computer engineering in She receive the M.Sc. an Ph.D. egrees in computer networks from the University Pierre et Marie Curie (Paris VI), Paris, France, in 2001 an 2004, respectively. Her research interests inclue routing an quality of service in mesh/sensor/a hoc networks, WiMax, an wireless LAN. Mauro Fonseca is currently Associate Professor at the Pontifical Catholic University of Paraná (PUC-PR), Curitiba-PR, Brazil. He receive the B.Sc. egree in computer engineering from PUC-PR, in 1994 an gaine the M.Sc. egree in networks an istribute systems from the the Feeral Center of Technological Eucation of Paraná (CEFET-PR), Curitiba-PR, Brazil, in He receive the Ph.D. egree in computer science from the University Pierre et Marie Curie (Paris VI), France, in His research interests are in service management frameworks an architectures for networks an beyon.

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance International Journal of Moern Communication Technologies & Research (IJMCTR) Impact of FTP Application file size an TCP Variants on MANET Protocols Performance Abelmuti Ahme Abbasher Ali, Dr.Amin Babkir

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

Overview : Computer Networking. IEEE MAC Protocol: CSMA/CA Internet mobility TCP over noisy links

Overview : Computer Networking. IEEE MAC Protocol: CSMA/CA Internet mobility TCP over noisy links Overview 15-441 15-441: Computer Networking 15-641 Lecture 24: Wireless Eric Anerson Fall 2014 www.cs.cmu.eu/~prs/15-441-f14 Internet mobility TCP over noisy links Link layer challenges an WiFi Cellular

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:

More information

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Mounir FRIKHA, Manel MAAMER Higher School of Communication of Tunis (SUP COM), Network Department, m.frikha@supcom.rnu.tn ABSTRACT

More information

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks Hinawi Publishing Corporation International Journal of Distribute Sensor Networks Volume 2014, Article ID 936379, 17 pages http://x.oi.org/10.1155/2014/936379 Research Article REALFLOW: Reliable Real-Time

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients Probabilistic Meium Access Control for 1 Full-Duplex Networks with Half-Duplex Clients arxiv:1608.08729v1 [cs.ni] 31 Aug 2016 Shih-Ying Chen, Ting-Feng Huang, Kate Ching-Ju Lin, Member, IEEE, Y.-W. Peter

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks Optimal Routing an Scheuling for Deterministic Delay Tolerant Networks Davi Hay Dipartimento i Elettronica olitecnico i Torino, Italy Email: hay@tlc.polito.it aolo Giaccone Dipartimento i Elettronica olitecnico

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stolyar Abstract Backpressure-base aaptive routing

More information

PAPER. 1. Introduction

PAPER. 1. Introduction IEICE TRANS. COMMUN., VOL. E9x-B, No.8 AUGUST 2010 PAPER Integrating Overlay Protocols for Proviing Autonomic Services in Mobile A-hoc Networks Panagiotis Gouvas, IEICE Stuent member, Anastasios Zafeiropoulos,,

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stoylar arxiv:15.4984v1 [cs.ni] 27 May 21 Abstract

More information

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA Preprint, August 5, 2018. 1 All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA Mikhail Ivanov, Frerik Brännström, Alexanre Graell i Amat, an Petar Popovski Department of Signals an Systems,

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

Supporting Fully Adaptive Routing in InfiniBand Networks

Supporting Fully Adaptive Routing in InfiniBand Networks XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Lab work #8. Congestion control

Lab work #8. Congestion control TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

Chalmers Publication Library

Chalmers Publication Library Chalmers Publication Library All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA This ocument has been ownloae from Chalmers Publication Library (CPL). It is the author s version of a work

More information

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques What is testing? ing is the process of emonstrating that errors are not present. The purpose

More information

On the Placement of Internet Taps in Wireless Neighborhood Networks

On the Placement of Internet Taps in Wireless Neighborhood Networks 1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

MODULE VII. Emerging Technologies

MODULE VII. Emerging Technologies MODULE VII Emerging Technologies Computer Networks an Internets -- Moule 7 1 Spring, 2014 Copyright 2014. All rights reserve. Topics Software Define Networking The Internet Of Things Other trens in networking

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

Image Segmentation using K-means clustering and Thresholding

Image Segmentation using K-means clustering and Thresholding Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,

More information

Ad-Hoc Networks Beyond Unit Disk Graphs

Ad-Hoc Networks Beyond Unit Disk Graphs A-Hoc Networks Beyon Unit Disk Graphs Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich 8092 Zurich, Switzerlan {kuhn, wattenhofer, zollinger}@inf.ethz.ch ABSTRACT

More information

TCP Timeout Mechanism for Optimization of Network Fairness and Performance in Multi-Hop Pipeline Network

TCP Timeout Mechanism for Optimization of Network Fairness and Performance in Multi-Hop Pipeline Network Draft Version - Brunel University, Lonon TCP Timeout Mechanism for Optimization of Network Fairness an Performance in Multi-Hop Pipeline Network Siva Kumar Subramaniam 1, Rajagopal Nilavalan 3, Wamaeva

More information

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

A SWARM INSPIRED MULTIPATH DATA TRANSMISSION WITH CONGESTION CONTROL IN MANETS USING PROBABILISTIC APPROACH

A SWARM INSPIRED MULTIPATH DATA TRANSMISSION WITH CONGESTION CONTROL IN MANETS USING PROBABILISTIC APPROACH A SWARM INSPIRED MULTIPATH DATA TRANSMISSION WITH CONGESTION CONTROL IN MANETS USING PROBABILISTIC APPROACH Subhankar oarar 1, Vanana Bhattacheree 2 an Debasis Giri 1 1 Department of Computer Science an

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Fair Time Sharing Protocol: a Solution for IEEE b Hot Spots

Fair Time Sharing Protocol: a Solution for IEEE b Hot Spots Fair Time Sharing Protocol: a Solution for IEEE 802.11b Hot Spots Anelise Munaretto 1,2, Mauro Fonseca 1,4, Khaldoun Al Agha 2,3, and Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 75015 Paris,

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

Cascading Multi-Hop Reservation and Transmission in Underwater Acoustic Sensor Networks

Cascading Multi-Hop Reservation and Transmission in Underwater Acoustic Sensor Networks Sensors 2014, 14, 18390-18409; oi:10.3390/s141018390 Article OPEN ACCESS sensors ISSN 1424-8220 www.mpi.com/journal/sensors Cascaing Multi-Hop Reservation an Transmission in Unerwater Acoustic Sensor Networks

More information

An Infrastructureless End-to-End High Performance Mobility Protocol

An Infrastructureless End-to-End High Performance Mobility Protocol Proceeings of the 5 IEEE International Conference on Electro Information Technology, 5, Lincoln Nebraska, May 5 An Infrastructureless En-to-En High Performance Mobility Protocol Saneep Davu, Rai Y. Zaghal

More information

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols Performance Comparison of Ad Hoc Routing Protocols over IEEE 82.11 DCF and TDMA MAC Layer Protocols Govind. P. Gupta Computer Science Department R.K.G.I.T, Ghaziabad (India) er_gpgupta@yahoo.com A. K.

More information

Connectivity Aware Routing in Ad-Hoc Networks

Connectivity Aware Routing in Ad-Hoc Networks Connectivity Aware Routing in Ad-Hoc Networks Jérémie Leguay PWC 05 With: Timur Friedman (LIP6), Vania Conan(Thales), Serge Fdida (LIP6), André Cotton(Thales) Corporate Communications Context Ad-Hoc Networks

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

A Plane Tracker for AEC-automation Applications

A Plane Tracker for AEC-automation Applications A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu

More information

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

Multicast Routing : Computer Networking. Example Applications. Overview

Multicast Routing : Computer Networking. Example Applications. Overview Multicast outing 5-744: Computer Networking Unicast: one source to one estination Multicast: one source to many estinations Two main functions: Efficient ata istribution Logical naming of a group L-0 Multicast

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University

More information

Performance Study of a Cross-Layer Based Multipath Routing Protocol for IEEE e Mobile Ad Hoc Networks

Performance Study of a Cross-Layer Based Multipath Routing Protocol for IEEE e Mobile Ad Hoc Networks I. J. Communications, Network an System Sciences, 2008, 4, 285-385 Publishe Online November 2008 in SciRes (http://www.scirp.org/journal/ijcns/). Performance Stuy of a Cross-Layer Base Multipath Routing

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

' INRIA Rocquencourt, Domaine de Voluceau

' INRIA Rocquencourt, Domaine de Voluceau OPTIMIZED FLOODING AND INTERFERENCE-AWARE QOS ROUTING IN OLSR* Dang Quan ~ ~ u ~ and e n Pascale ' ~inet' ' INRIA Rocquencourt, Domaine de Voluceau Rocquencourt - B.P 105 78153 Le Chesnay Cedex, France

More information

Trailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks

Trailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks Trailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks Xinxin Liu, Han Zhao, Xin Yang Computer & Information Science & Eng. University of Floria Email:{xinxin,han,xin}@cise.ufl.eu

More information

MODULE V. Internetworking: Concepts, Addressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, And End-To-End Services

MODULE V. Internetworking: Concepts, Addressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, And End-To-End Services MODULE V Internetworking: Concepts, Aressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, An En-To-En Services Computer Networks an Internets -- Moule 5 1 Spring, 2014 Copyright

More information

Congestion Control using Cross layer and Stochastic Approach in Distributed Networks

Congestion Control using Cross layer and Stochastic Approach in Distributed Networks Congestion Control using Cross layer an Stochastic Approach in Distribute Networks Selvarani R Department of Computer science an Engineering Alliance College of Engineering an Design Bangalore, Inia Vinoha

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

Modifying ROC Curves to Incorporate Predicted Probabilities

Modifying ROC Curves to Incorporate Predicted Probabilities Moifying ROC Curves to Incorporate Preicte Probabilities Cèsar Ferri DSIC, Universitat Politècnica e València Peter Flach Department of Computer Science, University of Bristol José Hernánez-Orallo DSIC,

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Performance Analysis of Routing Protocols in MANETs Using OPNET 14.0

Performance Analysis of Routing Protocols in MANETs Using OPNET 14.0 Performance Analysis of Routing Protocols in MANETs Using OPNET 14.0 Karanveer Singh 1, Naveen Goyal 2 1 Research Scholar,ECE Deptt.,Bhai Gurdas Institute of Engineering and Technology, Sangrur 2 Assistant

More information

Learning Polynomial Functions. by Feature Construction

Learning Polynomial Functions. by Feature Construction I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate

More information

A Metric for Routing in Delay-Sensitive Wireless Sensor Networks

A Metric for Routing in Delay-Sensitive Wireless Sensor Networks A Metric for Routing in Delay-Sensitive Wireless Sensor Networks Zhen Jiang Jie Wu Risa Ito Dept. of Computer Sci. Dept. of Computer & Info. Sciences Dept. of Computer Sci. West Chester University Temple

More information

TCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model

TCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model TCP Symbiosis: Congestion Control Mechanisms of TCP base on Lotka-Volterra Competition Moel Go Hasegawa Cybermeia Center Osaka University 1-3, Machikaneyama-cho, Toyonaka, Osaka 56-43, JAPAN Email: hasegawa@cmc.osaka-u.ac.jp

More information

Optimizing the quality of scalable video streams on P2P Networks

Optimizing the quality of scalable video streams on P2P Networks Optimizing the quality of scalable vieo streams on PP Networks Paper #7 ASTRACT The volume of multimeia ata, incluing vieo, serve through Peer-to-Peer (PP) networks is growing rapily Unfortunately, high

More information

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach Nishi Sharma, Vanna Verma Abstract Wireless sensor networks (WSNs) is one of the emerging fiel of research in recent era

More information

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks Provisioning Virtualize Clou Services in IP/MPLS-over-EON Networks Pan Yi an Byrav Ramamurthy Department of Computer Science an Engineering, University of Nebraska-Lincoln Lincoln, Nebraska 68588 USA Email:

More information

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter FDL sel. VOA SOA 100 Regular papers ONDM 2018 Scalable Deterministic Scheuling for WDM Slot Switching Xhaul with Zero-Jitter Bogan Uscumlic 1, Dominique Chiaroni 1, Brice Leclerc 1, Thierry Zami 2, Annie

More information

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita

More information

Dynamic Capacity Allocation in OTN Networks

Dynamic Capacity Allocation in OTN Networks Communications an Network, 2015, 7, 43-54 Publishe Online February 2015 in SciRes. http://www.scirp.org/journal/cn http://x.oi.org/10.4236/cn.2015.71005 Dynamic Capacity Allocation in OTN Networks Maria

More information

2-connected graphs with small 2-connected dominating sets

2-connected graphs with small 2-connected dominating sets 2-connecte graphs with small 2-connecte ominating sets Yair Caro, Raphael Yuster 1 Department of Mathematics, University of Haifa at Oranim, Tivon 36006, Israel Abstract Let G be a 2-connecte graph. A

More information

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly

More information

One-to-Many Multicast Restoration Based on Dynamic Core-Based Selection Algorithm in WDM Mesh Networks

One-to-Many Multicast Restoration Based on Dynamic Core-Based Selection Algorithm in WDM Mesh Networks Proceeings of the International MultiConference of Engineers an Computer Scientists 9 Vol I IMECS 9, March 18 -, 9, Hong Kong One-to-Many Multicast Restoration Base on Dynamic Core-Base Selection Algorithm

More information

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency Software Reliability Moeling an Cost Estimation Incorporating esting-effort an Efficiency Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, an Michael R. Lyu -+ Department of Electrical Engineering Computer Science

More information

A Hybrid Routing Algorithm for Delay Tolerant Networks

A Hybrid Routing Algorithm for Delay Tolerant Networks Sensors & Transucers 2013 by IFSA http://www.sensorsportal.com A Hybri Routing Algorithm for Delay Tolerant Networs Jianbo LI, Jixing XU, Lei YOU, Chenqu DAI, Jieheng WU Information Engineering College

More information

Improving Performance of Sparse Matrix-Vector Multiplication

Improving Performance of Sparse Matrix-Vector Multiplication Improving Performance of Sparse Matrix-Vector Multiplication Ali Pınar Michael T. Heath Department of Computer Science an Center of Simulation of Avance Rockets University of Illinois at Urbana-Champaign

More information

Top-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications

Top-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications Top-own Connectivity Policy Framework for Mobile Peer-to-Peer Applications Otso Kassinen Mika Ylianttila Junzhao Sun Jussi Ala-Kurikka MeiaTeam Department of Electrical an Information Engineering University

More information

Learning convex bodies is hard

Learning convex bodies is hard Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples

More information

Performance Modelling of Necklace Hypercubes

Performance Modelling of Necklace Hypercubes erformance Moelling of ecklace ypercubes. Meraji,,. arbazi-aza,, A. atooghy, IM chool of Computer cience & harif University of Technology, Tehran, Iran {meraji, patooghy}@ce.sharif.eu, aza@ipm.ir a Abstract

More information

Improved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique

Improved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique Improved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique Vijay J Parmar Department of Computer Engineering,Sarvajanic College of Engineering and Technology Surat, Gujrat (India),E-mail

More information