A Hierarchical P2PSIP Architecture to support Skype-like services

Size: px
Start display at page:

Download "A Hierarchical P2PSIP Architecture to support Skype-like services"

Transcription

1 A Hierarchical P2PSIP Architecture to support Skype-like services Isaias Martinez-Yelmo, Carmen Guerrero, Ruben Cuevas Departamento e Ingeniería Telemática Universia Carlos III e Mari Av. Universia Leganés. Mari Spain) {imyelmo, guerrero, rcuevas}@it.uc3m.es Anreas Mauthe Computing Department, InfoLab 21 Lancaster University Lancaster LA1 4WA U) anreas@comp.lancs.ac.uk Abstract A Hierarchical DHT Overlay Architecture base on P2PSIP is propose to support a Skype-like service. The IETF P2PSIP Working Group is stanarising a protocol to support any DHT in orer to eploy services insie a omain. We exten its functionality to allow the interaction between peers of ifferent omains. Furthermore, we perform an analysis of the Routing Performance an Resource Consumption uner a Skype-like scenario where VoIP calls are more likely to happen among users of the same omain. 1. Introuction Nowaays, one of the most wiely researche topics is the provision of Multimeia services on the Internet. However, ue to their requirements, currently there is a lack of evelopment effort. Although, some services are successful, Skype is a goo example), they are not easy to esign an evelop. Thus, aitional research an tools are neee in orer to eploy easily Multimeia ae value services. In this paper, we examine the benefits of aopting a Hierarchical Overlay Network to evelop a Skype-like service. Skype is a wiely use application, but it is a proprietary solution an a stanarise solution is preferre. Some etails about Skype can be foun in [6] or [16]. In orer to obtain a low cost Skype-like solution, the IETF P2PSIP Working Group has been create to work on a similar but stanarise alternative. The iea is to provie a ecentralise architecture that replaces the functionalities of proxy an registrar SIP servers with a peer-to-peer overlay network [2]. The result of this work is the P2PSIP protocol [7] that is being efine to support any kin of DHT overlay network such as Content Aressable Network CAN) [14] or aemlia [11] where the esire information can Figure 1. Hierarchical Overlay Architecture be store in a ecentralise fashion. Furthermore, the connections woul be NAT Traversal capable using the ICE protocol [15] base on STUN an TURN relays publishe as services in the P2P network. However, the connectivity is only possible between peers of the same P2PSIP omain.however, our proposal enables the connectivity between ifferent omains. This proposal is shown in Fig.1 where ifferent P2PSIP omains eploy their own overlay an global connectivity between the ifferent omains is obtaine with an Interconnection Overlay in which each omain is represente by at least one super-peer. This approach has a number of avantages: first of all, VoIP calls usually are more frequent among peers that belong to the same omain. Several examples inclue intraomain VoIP calls insie the heaquarters of a private company or VoIP calls an Instant Messaging between people subscribe to some Community/Social Network. Secon, a hierarchical architecture allows fault isolation since if a network failure happens in the gateway router of a company supporting P2PSIP for its VoIP calls, it oes not affect other P2PSIP omains. The Interconnection Overlay is only slightly affecte since only this super-peer is not reachable. In aition,

2 the avantage of a better scalability is obtaine, which is a known fact in hierarchical architectures [18]. Other well known avantages are explaine in literature [1]. This paper aresses how a Hierarchical DHT Overlay Network can be use to interconnect ifferent P2PSIP omains an it stuies analytically the Routing Performance in terms of hops to reach the estination. The rest of the paper is structure as follows. Section 2 presents the propose hierarchical DHT architecture an how to apply the propose architecture to provie a global P2P VoIP service. The Routing Performance of this architecture consiering the intra-omain hit probability is etaile in section 3. The efficiency of this architecture is explore in the case of a Hierarchical CAN Overlay Network in section 4. Finally, in section 5 the relate work associate with Hierarchical Overlay Networks is presente an section 6 presents the conclusions. 2. Hierarchical DHT Overlay Architecture The propose hierarchical architecture is base on creating two ifferent levels: i) the P2PSIP omains an ii) the Interconnection Overlay. If a peer wants to retrieve information from a ifferent omain, it must route its query to the super-peers, which maintain the reachability between the ifferent omains through the Interconnection Overlay. Thus, any omain is reache through the Interconnection Overlay. Prefix ID n-bits) Suffix IDm-bits) Figure 2. Hierarchical ID The IDs that supports this architecture are compose by two fiels a Prefix an a Suffix as it is illustrate in Fig.2. Peers insie a omain use the Suffix ID for the omain overlay network. On the other han, the super-peers route the queries along the Interconnection Overlay using the Prefix ID. Thus, if a peer nees to fin a peer or item with a ifferent Prefix ID, the query is sent to its super-peer. This super-peer routes the query to the super-peer that manages the omain in which the estination peer is place an finally the query is propagate in the target omain. Peers obtain several benefits with this approach. The maintenance state is reuce in comparison with the flat counterpart, a peer only has to take care about the peers of its own omain. If a flat overlay network is use to support all the peers of the ifferent omains, the routing tables of all the peers woul be larger. With the hierarchical approach, peers have to maintain in average an overlay of N/ peers where is the number of omains), whereas in the flat overlay the number of peers is N. In fact, the reuction of routing entries with this architecture in the peers is approximately log B log B N 100 % if the routing size has a logarithmic epenency with the number of peers which is quite common). This reuction not only implies less memory an CPU consumption, but the banwith neee for the maintenance of the overlay routing entries is also reuce. This is an avantage in comparison with other proposals like [4], [19]. The rawback is the overloa in the super-peers [1], especially in the case of banwith an CPU consumption. In this paper, we assume that a mechanism exists to select suitable super-peers [12], [13] Interconnection of P2PSIP omains One of the main problems in eveloping a ecentralise architecture the mapping between the available information an the peers in the system. If we consier a VoIP environment, the most usual way of referencing a buy is using URIs e.g. user@example.com). Associate with each URI, a Resource contains the user location information. An user URI can be ivie in two fiels: user ID user) an omain ID example.com), which are separate Thus, this separation can be use to map user URIs to a Hierarchical DHT Overlay Network. The Prefix ID or omain ID is create with the hash of the omain ID: Prefix ID = hashexample.com). The Suffix ID or peer ID is generate with the hash of the URI: Suffix ID = hashuser@example.com). Once the mapping is performe, a tuple containing the esire contact information an the generate key is store on the overlay. This operation is equivalent to the registration in the registrar SIP server in a SIP environment. At this point, the user information is available for the rest of the users. The worst case scenario for retrieving this information occurs when the target buy is locate in an other omain. In this case, the Prefix ID is generate from the omain ID an the Suffix ID from the complete URI. Once this actions are performe, a request is sent to the super-peer of the own omain. Then, the super-peer is able to route the query to the super-peer of the target omain using the Prefix ID. Once the super-peer of target omain receives the query, it forwars the query insie the omain using the Suffix ID. If the contact information is available, it is immeiately sent back an the establishment of a Multimeia Session starts.

3 Figure 3. Hierarchical P2PSIP Signalling 2.2. Signalling Exchange An example of the signalling on the propose hierarchical scenario is illustrate in Fig.3, consiering the actual status of the P2PSIP protocol [7]. We must take into account several things in orer to unerstan the signalling flow. First of all, when the peer in omain.b requests the information of the query in the Fetch message is in plain text. This is because a peer in a omain oes not have to know what hash function is being use on the interconnection overlay an what hash function woul be use in the other P2PSIP omain, which can have any length an also gives the Prefix ID length. Thus, the super-peer in omain.b performs hashomain.a) in orer to obtain the information of the super-peers in omain.a through the interconnection overlay. Insie this information, the hash use on the other omain is inclue hash a ), an therefore a request for the esire item is correctly forme with the correct length as hash a user1@omain.a). Thus, the esire interoperability is obtaine. Finally, the peers taking care of the esire Resource-ID answers to the super-peer on omain.a, which forwars this information to superpeer in omain.b. Super-peer in omain.b sen the esire Resource-ID to the peer in omain.b. Once this flow finishes, a legacy SIP negotiation is initiate for a VoIP call. We must highlight that Fig.3 represents only a subset of the real flow where the intermeiate hops in each overlay are not shown. 3. Routing Performance in a Hierarchical Overlay Network for a Skype-like service In this section we stuy the Routing Performance of the architecture propose. We exten the methoology efine in [10] with a more etaile explanation an moel as well as a complete explanation of the consiere assumptions. The parameters in the analytical moel are efine as follows: : number of P2PSIP omains. M i : number of peers in the P2PSIP omain i. N: all peers in the ifferent P2PSIP omains. It is consiere that a peer cannot be attache to multiple omains, hence N = i=1 M i. ρ ij : probability of launching a query from the P2PSIP omain i to the P2PSIP omain j. Cx): number of hops neee to fin a super-peer on the interconnection overlay epening on the number of super-peers x. It epens on the type of overlay use in the interconnection overlay. D i x): number of hops neee to fin a peer in P2PSIP omain i as function of the number of peers x belonging to the P2PSIP omain. We assume that all the peers in a P2PSIP omain know their super-peer attache in the interconnection overlay. This assumption implies that only one hop is neee to reach the super-peer. Taking into account the above efinitions, we obtain the Routing Performance R.P.) of this DHT-base hierarchical overlay network. Let us efine the cost of fining a peer on each overlay: D i M i ): cost of fining a peer on its own omain. C ): cost of fining a super-peer on the interconnection overlay. If the probability of obtaining an item in a P2PSIP omain from its super-peer is consiere negligible this can be assume because the number of superpeers is N/ an N ), the average Routing Performance for a peer in omain i can be written as follows: RP i = ρ ii D i M i )+ j=1,j i ρ ij [1 + D j M j ) + C )] 1) The first term in the previous expression is the cost of searching within the P2PSIP omain of a peer, whereas the secon term is the cost for searches in other omains. Thus, the average number of hops is expresse as: RP = 1 N M i RP i 2) i=1 However, some simplifications can be one in Eq.2 if the number of peers is the same in all omains: RP = 1 RP i 3) i=1

4 an D x) = l x 1 l, so if we use them on Eq.6, we have that the Routing Performance R.P.) is: ) R.P. = l N/) 1 l + 1 ρ ii ) 1 + i 1 i 7) Figure 4. Hierarchical CAN network Since we consiere an equal number of peers in all P2PSIP omains an each look-up in the overlay is ranomly inepenent, the probability of looking for a peer attache to other omain can be equally istribute between all the foreign omains.however, we may still have situations where the probability of looking for a peer in the own P2PSIP omain is ifferent from the probability of looking for a peer in other omains, in which case Eq.1 is expresse as follows: RP i = ρ ii D i M)+ 1 ρ ii [1 + D j M) + C )] 1 j=1,j i 4) This relation is useful for some type of scenarios. For instance, it can be use in a VoIP scenario where the probability of performing a call within the same omain is higher than a call to an external omain. Finally, if the same overlay is use on all the P2PSIP omains the sum can be eliminate from Eq.4: RP i = ρ ii D M) + 1 ρ ii ) [1 + D M) + C )] 5) From Eq.3 an Eq.4 we obtain the next equality: RP = RP i = D M) + 1 ρ ii ) [1 + C )] 6) We efine ρ ii as the intra-omain hit probability an it efines the probability of establishing a connection insie the own omain. 4. Hierarchical CAN Network In this section we stuy the performance of a hierarchical CAN overlay with two levels, this is shown in Fig.4. Accoring to [14], we have that C x) = i x 1 i Eq.7 represents the Routing Performance for a hierarchical CAN overlay where l is the number of imensions for the overlays in each omain an i is the number of imensions for the interconnection overlay. Each value can be optimise inepenently consiering the number of peers at each level. Thus, it can be state that l = lnn/) an i = ln these values can be obtaine minimising the Routing Performance of the flat CAN overlay network [14]). However, if the evelopment of a hierarchical CAN base application is consiere, it woul be reasonable to use the same value in both levels of the hierarchy, since just one version of CAN nees to be implemente an the coe can be easily reuse. Eq.8 presents the Routing Performance when only one value of is use in both layers: ) R.P. = N/) ρ ii ) ) The stuy that can be applie to this scenario is to optimise the R.P. accoring to the number of imensions when the number of P2PSIP omains an the number of peers per omain is given. This stuy makes sense since P2PSIP omains are inepenent entities that cannot be merge or splitte, an therefore an optimisation in relation with is not possible an only can be use to optimise the R.P. Theorem 1. The value of that minimises the number of hops on a hierarchical CAN overlay network with N peers an omains is unique. Proof: First we prove the existence of a minimum by eriving Eq.8 with respect to : f ) = ) 1 N 1 ln + 1 ρ ii ) 1 N 1 ln 1 ) 1 ) + Taking into account that 1, ), then: f = 1) = N an ) 9) 1 ln N ) + 1 ρ ii ) 1 ln) 10)

5 lim f ) = 2 ρ ii 11) N Thus, if, > e, then f = 1) < 0 an f = ) > 0 an consiering that f is a continuous function, we can conclue that one or more solutions exist for f ) = 0 in our range of work. Now we prove the unicity of the solution. Therefore, the secon erivate with respect to is calculate: f ) = 1 ) 1 N ln N ) 1 ) ) + 1 ρ ii ) 1 ) 2 ln 1 Taking into account again that f ) > 0, 1, ), then f ) is a monotonic increasing function an there is only one solution of f ) = 0 an this value is a minimum. The result of the theorem is interesting because it assures an optimal value for the number of imensions in a hierarchical CAN overlay network. Thus, let us explore if some result can be obtaine. We apply the following variable substitution: A = N/) 1, B = 1 13) If the above substitution is applie in Eq.9, we have: f ) = A 1 lna) + B 1 lnb) 14) Furthermore, if A an B are transforme to fin a relation between them, we can obtain: lnb = ln lna 15) lnn/) ln Suppose x =, we obtain that that B = lnn/) A x. With this result, we can rewrite Eq.14 as: f ) = A 1 lna) + 1 ρ ii )A x 1 lna x ) 16) The bisection metho can be use to solve f ) = 0. The solution gives the optimum value for accoring to the number of P2PSIP omains an the number N of peers. One scenario where these parameters are given coul be VoIP, is the number of groups that must be attache in the interconnection overlay in orer to be reachable between them an N is the overall number of peers. In orer to unerstan the importance of the number of imensions on a Hierarchical CAN Overlay : number of imensions Optimum parameter when [2, 1e5]. N=1e+006 Bisection result ρ=0 Roune bisection result ρ=0 Bisection result ρ=0.1 Roune bisection result ρ=0.1 Bisection result ρ=0.3 Roune bisection result ρ=0.3 Bisection result ρ=0.6 Roune bisection result ρ=0.6 Bisection result ρ=0.9 Roune bisection result ρ= Number of clusters x 10 4 Figure 5. Optimum value of epening on parameter =100 =333 =1000 =3333 =10000 parameter vs ρ parameter ρ Hit Ratio) Figure 6. Depenency of parameter with ρ ii Network, Eq.16 has been solve using the numerical metho of bisection. The value of N = 10 6 has been use for this analysis an a large range of values has been explore. The results are shown in Fig.5, the soli line is the result of the bisection metho an the ashe line is the nearest integer to the bisection results for each value of. We can observe how the value of changes with. It is interesting to note that the variation of is not a monotonic function with an it has a minimum value epening on the intra-omain hit ratio ρ ii. Fig.6 presents the epenency of with the intraomain hit probability. In soli lines is represente the result of the bisection metho applie to ifferent values of ρ ii for N = 10 6 an fixe values of. Dash-ot lines are use for the nearest integer values to the bisection results. The legen of the figure has the corresponence between the markers an the ifferent values of. If < N, the epenency of with respect to ρ ii is a monotonous increasing function. Whereas, if > N, the epenency of

6 45 40 Mean number of hops epening on an 2,1e5). N=1e+006 ρ=0, l, i ρ=0, opt ρ=0.1,, l i ρ=0.1, opt the maintenance state. 5. Relate Work Mean number of hops ρ=0.3, l, i ρ=0.3, opt ρ=0.6, l, i ρ=0.6, opt ρ=0.9, l, i ρ=0.9, opt Number of clusters x 10 4 Figure 7. Routing Performance Hops) with respect to ρ ii is a monotonous ecreasing function. Furthermore, for = N the value of with respect to ρ ii is a constant. This is the point where the monotonous increasing epenency changes to monotonous ecreasing. When ρ ii 0, 0.65), the value of [7, 8] inepenently of. This implies a wie range of work for if ρ ii 0, 0.65). However, for higher values of ρ ii, [5, 9]. Thus, more attention must be pai to ρ ii since the parameter has a smaller range of work. Furthermore, in orer to see the performance of a hierarchical CAN overlay, the Routing Performance complexity for an optimum flat CAN overlay is plotte in Fig.7 with a ashe line with stars flat = 14). The Routing Performance for ifferent values of the intraomain hit ratio is in ashot lines when l an i are configure inepenently. On the other han, the Routing Performance when an unique parameter is use is epicte with ashe lines. The values of were obtaine from Fig.5. The key shows the ifferent values of ρ ii that were use. Obviously, the Routing Performance is improve if the intra-omain hit ratio increases. A better Routing Performance than the flat counterpart can be obtaine with small values of ρ ii. Aitionally, we obtain a smaller maintenance cost if we use the optimal values of from Fig.5. We can also observe how the ifference between using an unique value of or a value of for each level ecreases if the intra-omain hit ratio increases. In aition we obtain a reuction of the state maintenance. This state is reuce from flat overlay routing entries [14] to the values shown in Fig.5. The optimal value of for the Hierarchical CAN Overlay Network epens on the number of omains, the number of peers an the intra-omain hit ratio, but usually, for most of the cases, we get a reuction of the 50% in flat Stuies relate with hierarchical overlay networks have been one to improve the performance of flat overlay networks. When a hierarchical architecture is consiere, the ifferent trae-offs that arise with these types of architecture have to be taken into account. Furthermore, these architectures have benefits [8], [9] in comparison with the flat ones. One approach is to elegate all the work to superpeers [5], [20], which maintain the overlay network an perform all the necessary actions, peers only have to register their information to their super-peers. In our proposal, super-peers only have to store the information neee of the routing table for its P2PSIP omain, which is lighter logm i ) an esirable for a more scalable solution. Other stuies focus on ecrementing the elay in peer-to-peer overlay transactions. In [19], a low elay hierarchical overlay network base on Chor is propose. The rawback is the high state maintenance neee memory, CPU an banwith) because all the peers in the overlay are attache to all the levels in a n-level hierarchy. A less aggressive esign with the same objective is presente in [4] where a hierarchical structure is built with the constraint of limiting the maintenance cost to the flat counterpart. The proposal in this paper only overloas super-peers, which is esirable because peers can be more lightweight. This feature is attractive for hanhel evices that are caniates to use Skype-like applications in the future. In relation with Hierarchical P2PSIP architectures, there is some work presente in [17]. However it oes not provie a very etaile analysis on the Routing Performance an how to eal with non-fixe lengths in the Prefix an Suffix IDs neee for interoperability. 6. Conclusions In this paper a Hierarchical DHT-base Overlay Architecture has been efine using the ongoing work in the IETF P2PSIP WG. In our proposal, there are ifferent P2PSIP omains where an overlay is maintaine using the P2PSIP protocol. Each omain has a super-peer that allows the connectivity with the rest of the omains through the Interconnection Overlay. The routing in each omain is base on a Suffix ID, whereas the routing in the Interconnection Overlay is base on the Prefix ID. If the Prefix ID an the Suffix ID are efine respectively as Prefix ID=hashexample.com)

7 an Suffix a global Skype-like service can be provie between the ifferent P2PSIP omains. We provie a iscussion on the Routing Performance epening on the intra-omain hit probability ρ ii ), which is the probability of oing calls insie the own omain. A reuction in the Routing Performance with respect to the flat counterpart is achieve since the hierarchical architecture takes avantage of the intraomain hit probability, which is not possible in a flat overlay network. In the case of a Hierarchical CAN Overlay, the optimal value of for a given number of omains an values of ρ ii is obtaine. Furthermore, we observe how the intra-omain hit ratio reuces the Routing Performance on a hierarchical CAN overlay network an how the optimal values of can be use in a wie range of work. Aitionally, the complex relation between the optimal value for the number of imensions an the value of the intra-omain hit probability an the number of groups is explaine. We conclue that most of the cases, the maintenance costs is also reuce up to a 50% in comparison with the flat one. In orer to continue this work, simulations using the PeerFactSim.om [3] simulator are being evelope. Acknowlegement This work has been supporte by the European Union uner the IST Content NoE FP IST ), by the Regional Government of Mari uner the BioGriNet project CAM, S-0505/TIC-0101) an by the Ministry of Science an Innovation uner the CONPARTE project MEC, TEC C03-03/TCM). References [1] B. Beverly Yang an H. Garcia-Molina. Designing a super-peer network. In Data Engineering, Proceeings. 19th International Conference on, pages 49 60, [2] D. Bryan, P. Matthews, E. Shim, an D. Willis. Concepts an terminology for peer to peer sip, July Internet Draft raft-ietf-p2psip-concepts-02.txt. [3] V. Darlagiannis, A. Mauthe, N. Liebau, an R. Steinmetz. An Aaptable, Role-base Simulator for P2P Networks. Proceeings of the International Conference on Moeling, Simulation an Visualization Methos, pages 52 59, [4] P. Ganesan,. Gummai, an H. Garcia-Molina. Canon in g major: esigning hts with hierarchical structure. In Distribute Computing Systems, Proceeings. 24th International Conference on, pages , [5] L. Garces-Erice, E. W. Biersack,. W. Ross, P. A. Felber, an G. Urvoy-eller. Hierarchical p2p systems. In Proceeings of ACM/IFIP International Conference on Parallel an Distribute Computing Euro-Par), [6] S. Guha, N. Daswani, an R. Jain. An experimental stuy of the skype peer-to-peer voip system. In In IPTPS [7] C. Jennings, B. Lowekamp, E. Rescorla, S. Baset, an H. Schulzrinne. Resource location an iscovery reloa), July Internet Draft raft-ietf-p2psipreloa-00.txt. [8] M. won an S. Fahmy. Towar Cooperative Interoverlay Networking. Proceeings of IEEE ICNP, [9] M. won an S. Fahmy. Synergy: an overlay internetworking architecture. In Computer Communications an Networks, ICCCN Proceeings. 14th International Conference on, pages , [10] I. Martinez-Yelmo, R. Cuevas, C. Guerrero, an A. Mauthe. Routing performance in hierarchical htbase overlay networks. In In Proceeings on 16th Euromicro International Conference on Parallel, Distribute an network-base Processing, Feb [11] P. Maymounkov an D. Mazieres. IPTPS 2002 Cambrige, MA, USA, March 7-8, Revise Papers, volume 2429/2002 of Lecture Notes in Computer Science, chapter aemlia: A peer-to-peer information system base on the XOR metric, pages Springer, [12] S.-H. Min, J. Holliay, an D.-S. Cho. Optimal superpeer selection for large-scale p2p system. In Hybri Information Technology. ICHIT 06. Vol 2. International Conference on, volume 2, pages , [13] A. T. Mizrak, Y. Cheng, V. umar, an S. Savage. Structure superpeers: leveraging heterogeneity to provie constant-time lookup. In Internet Applications. WIAPP. Proceeings., pages , [14] S. Ratnasamy, P. Francis, M. Hanley, R. arp, an S. Schenker. A scalable content-aressable network. In SIGCOMM 01, pages , New York, NY, USA, ACM Press. [15] J. Rosenberg. Interactive connectivity establishment ice): A protocol for network aress translator nat) traversal for offer/answer protocols, October Internet Draft raft-ietf-mmusic-ice-19.txt. [16] D. Rossi, M. Melia, an M. Meo. A etaile measurment of skype network traffic. In In IPTPS 2008, [17] J. Shi, Y. Wang, L. Gu, L. Li, W. Lin, Y. Li, Y. Ji, an P. Zhang. A hierarchical peer-to-peer sip system for heterogeneous overlays interworking. Global Telecommunications Conference, GLOBECOM 07. IEEE, pages 93 97, Nov [18] H. Simon. The architecture of complexity. In M. Press, eitor, The Sciences of the Artificial, pages [19] Z. Xu, R. Min, an Y. Hu. Hieras: a ht base hierarchical p2p routing algorithm. In Parallel Processing, Proceeings. International Conference on, [20] S. Zoels, Z. Despotovic, an W. ellerer. Cost-base analysis of hierarchical ht esign. In Peer-to-Peer Computing. P2P Sixth IEEE International Conference on, pages , 2006.

Computer Networks 53 (2009) Contents lists available at ScienceDirect. Computer Networks. journal homepage:

Computer Networks 53 (2009) Contents lists available at ScienceDirect. Computer Networks. journal homepage: Computer Networks 53 (2009) 556 568 Contents lists available at ScienceDirect Computer Networks journal homepage: www.elsevier.com/locate/comnet H-P2PSIP: Interconnection of P2PSIP domains for global multimedia

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Performance Modelling of Necklace Hypercubes

Performance Modelling of Necklace Hypercubes erformance Moelling of ecklace ypercubes. Meraji,,. arbazi-aza,, A. atooghy, IM chool of Computer cience & harif University of Technology, Tehran, Iran {meraji, patooghy}@ce.sharif.eu, aza@ipm.ir a Abstract

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:

More information

Supporting Fully Adaptive Routing in InfiniBand Networks

Supporting Fully Adaptive Routing in InfiniBand Networks XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Optimal Oblivious Path Selection on the Mesh

Optimal Oblivious Path Selection on the Mesh Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Lab work #8. Congestion control

Lab work #8. Congestion control TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

Calculation on diffraction aperture of cube corner retroreflector

Calculation on diffraction aperture of cube corner retroreflector November 10, 008 / Vol., No. 11 / CHINESE OPTICS LETTERS 8 Calculation on iffraction aperture of cube corner retroreflector Song Li (Ó Ø, Bei Tang (», an Hui Zhou ( ï School of Electronic Information,

More information

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita

More information

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks Provisioning Virtualize Clou Services in IP/MPLS-over-EON Networks Pan Yi an Byrav Ramamurthy Department of Computer Science an Engineering, University of Nebraska-Lincoln Lincoln, Nebraska 68588 USA Email:

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency Software Reliability Moeling an Cost Estimation Incorporating esting-effort an Efficiency Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, an Michael R. Lyu -+ Department of Electrical Engineering Computer Science

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Modifying ROC Curves to Incorporate Predicted Probabilities

Modifying ROC Curves to Incorporate Predicted Probabilities Moifying ROC Curves to Incorporate Preicte Probabilities Cèsar Ferri DSIC, Universitat Politècnica e València Peter Flach Department of Computer Science, University of Bristol José Hernánez-Orallo DSIC,

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Two Dimensional-IP Routing

Two Dimensional-IP Routing Two Dimensional-IP Routing Mingwei Xu Shu Yang Dan Wang Hong Kong Polytechnic University Jianping Wu Abstract Traitional IP networks use single-path routing, an make forwaring ecisions base on estination

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

Control of Scalable Wet SMA Actuator Arrays

Control of Scalable Wet SMA Actuator Arrays Proceeings of the 2005 IEEE International Conference on Robotics an Automation Barcelona, Spain, April 2005 Control of Scalable Wet SMA Actuator Arrays eslie Flemming orth Dakota State University Mechanical

More information

Design of Policy-Aware Differentially Private Algorithms

Design of Policy-Aware Differentially Private Algorithms Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft

More information

Top-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications

Top-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications Top-own Connectivity Policy Framework for Mobile Peer-to-Peer Applications Otso Kassinen Mika Ylianttila Junzhao Sun Jussi Ala-Kurikka MeiaTeam Department of Electrical an Information Engineering University

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which

More information

Optimal Link Capacity Dimensioning in Proportionally Fair Networks

Optimal Link Capacity Dimensioning in Proportionally Fair Networks Optimal Link Capacity Dimensioning in Proportionally Fair Networks Micha l Pióro 1,Gábor Malicskó 2, an Gábor Foor 3 1 Department of Communication Systems, Lun Institute of Technology, Sween, Michal.Pioro@telecom.lth.se

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

Service Quality Assurance Mechanisms for P2P SIP VoIP

Service Quality Assurance Mechanisms for P2P SIP VoIP Service Quality Assurance Mechanisms for P2P SIP VoIP Xiaofei Liao, Fengjiang Guo, and Hai Jin Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and

More information

A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Based on Gravity

A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Based on Gravity Worl Applie Sciences Journal 16 (10): 1387-1392, 2012 ISSN 1818-4952 IDOSI Publications, 2012 A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Base on Gravity Aliasghar Rahmani Hosseinabai,

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 0 0 0 0 0 0 0 0 on-uniform Sensor Deployment in Mobile Wireless Sensor etworks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University Boca Raton,

More information

P2PSIP, ICE, and RTCWeb

P2PSIP, ICE, and RTCWeb P2PSIP, ICE, and RTCWeb T-110.5150 Applications and Services in Internet October 11 th, 2011 Jouni Mäenpää NomadicLab, Ericsson Research AGENDA Peer-to-Peer SIP (P2PSIP) Interactive Connectivity Establishment

More information

Divide-and-Conquer Algorithms

Divide-and-Conquer Algorithms Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:

More information

PAPER. 1. Introduction

PAPER. 1. Introduction IEICE TRANS. COMMUN., VOL. E9x-B, No.8 AUGUST 2010 PAPER Integrating Overlay Protocols for Proviing Autonomic Services in Mobile A-hoc Networks Panagiotis Gouvas, IEICE Stuent member, Anastasios Zafeiropoulos,,

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Politecnico i Torino Porto Institutional Repository [Proceeing] Automatic March tests generation for multi-port SRAMs Original Citation: Benso A., Bosio A., i Carlo S., i Natale G., Prinetto P. (26). Automatic

More information

On the Placement of Internet Taps in Wireless Neighborhood Networks

On the Placement of Internet Taps in Wireless Neighborhood Networks 1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu

More information

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance International Journal of Moern Communication Technologies & Research (IJMCTR) Impact of FTP Application file size an TCP Variants on MANET Protocols Performance Abelmuti Ahme Abbasher Ali, Dr.Amin Babkir

More information

Layer Optimization for DHT-based Peer-to-Peer Network

Layer Optimization for DHT-based Peer-to-Peer Network Layer Optimization for DHT-based Peer-to-Peer Network Jun Li *, Cuilian Li, Zhaoxi Fang Department of Telecommunication Zhejiang Wanli University Ningbo, China xxllj, licl@zwu.edu.cn, zhaoxifang@gmail.com

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

Table-based division by small integer constants

Table-based division by small integer constants Table-base ivision by small integer constants Florent e Dinechin, Laurent-Stéphane Diier LIP, Université e Lyon (ENS-Lyon/CNRS/INRIA/UCBL) 46, allée Italie, 69364 Lyon Ceex 07 Florent.e.Dinechin@ens-lyon.fr

More information

A fast embedded selection approach for color texture classification using degraded LBP

A fast embedded selection approach for color texture classification using degraded LBP A fast embee selection approach for color texture classification using egrae A. Porebski, N. Vanenbroucke an D. Hama Laboratoire LISIC - EA 4491 - Université u Littoral Côte Opale - 50, rue Ferinan Buisson

More information

EFFICIENT ON-LINE TESTING METHOD FOR A FLOATING-POINT ADDER

EFFICIENT ON-LINE TESTING METHOD FOR A FLOATING-POINT ADDER FFICINT ON-LIN TSTING MTHOD FOR A FLOATING-POINT ADDR A. Droz, M. Lobachev Department of Computer Systems, Oessa State Polytechnic University, Oessa, Ukraine Droz@ukr.net, Lobachev@ukr.net Abstract In

More information

Ad-Hoc Networks Beyond Unit Disk Graphs

Ad-Hoc Networks Beyond Unit Disk Graphs A-Hoc Networks Beyon Unit Disk Graphs Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich 8092 Zurich, Switzerlan {kuhn, wattenhofer, zollinger}@inf.ethz.ch ABSTRACT

More information

Clustering using Particle Swarm Optimization. Nuria Gómez Blas, Octavio López Tolic

Clustering using Particle Swarm Optimization. Nuria Gómez Blas, Octavio López Tolic 24 International Journal Information Theories an Applications, Vol. 23, Number 1, (c) 2016 Clustering using Particle Swarm Optimization Nuria Gómez Blas, Octavio López Tolic Abstract: Data clustering has

More information

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,

More information

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure

More information

Adjusted Probabilistic Packet Marking for IP Traceback

Adjusted Probabilistic Packet Marking for IP Traceback Ajuste Probabilistic Packet Marking for IP Traceback Tao Peng, Christopher Leckie, an Kotagiri Ramamohanarao 2 ARC Special Research Center for Ultra-Broaban Information Networks Department of Electrical

More information

P2PSIP Draft Charter. Dean Willis March 2006

P2PSIP Draft Charter. Dean Willis March 2006 P2PSIP Draft Charter Dean Willis March 2006 Purpose The purpose of the Peer-to-Peer (P2P) Session Initiation Protocol working group (P2PSIP WG) is to develop guidelines and mechanisms for the use of the

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

A Plane Tracker for AEC-automation Applications

A Plane Tracker for AEC-automation Applications A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)

More information

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,

More information

A Measurement Framework for Pin-Pointing Routing Changes

A Measurement Framework for Pin-Pointing Routing Changes A Measurement Framework for Pin-Pointing Routing Changes Renata Teixeira Univ. Calif. San Diego La Jolla, CA teixeira@cs.ucs.eu Jennifer Rexfor AT&T Labs Research Florham Park, NJ jrex@research.att.com

More information

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun

More information

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember 107 IEICE TRANS INF & SYST, VOLE88 D, NO5 MAY 005 LETTER An Improve Neighbor Selection Algorithm in Collaborative Filtering Taek-Hun KIM a), Stuent Member an Sung-Bong YANG b), Nonmember SUMMARY Nowaays,

More information

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter FDL sel. VOA SOA 100 Regular papers ONDM 2018 Scalable Deterministic Scheuling for WDM Slot Switching Xhaul with Zero-Jitter Bogan Uscumlic 1, Dominique Chiaroni 1, Brice Leclerc 1, Thierry Zami 2, Annie

More information

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stolyar Abstract Backpressure-base aaptive routing

More information

Algorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times

Algorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times Algorithm for Intermoal Optimal Multiestination Tour with Dynamic Travel Times Neema Nassir, Alireza Khani, Mark Hickman, an Hyunsoo Noh This paper presents an efficient algorithm that fins the intermoal

More information

Spare Capacity Planning Using Survivable Alternate Routing for Long-Haul WDM Networks

Spare Capacity Planning Using Survivable Alternate Routing for Long-Haul WDM Networks Spare Capacity Planning Using Survivable lternate Routing for Long-Haul WDM Networks in Zhou an Hussein T. Mouftah Department of lectrical an Computer ngineering Queen s University, Kingston, Ontario,

More information

Frequent Pattern Mining. Frequent Item Set Mining. Overview. Frequent Item Set Mining: Motivation. Frequent Pattern Mining comprises

Frequent Pattern Mining. Frequent Item Set Mining. Overview. Frequent Item Set Mining: Motivation. Frequent Pattern Mining comprises verview Frequent Pattern Mining comprises Frequent Pattern Mining hristian Borgelt School of omputer Science University of Konstanz Universitätsstraße, Konstanz, Germany christian.borgelt@uni-konstanz.e

More information

Implementation and Evaluation of NAS Parallel CG Benchmark on GPU Cluster with Proprietary Interconnect TCA

Implementation and Evaluation of NAS Parallel CG Benchmark on GPU Cluster with Proprietary Interconnect TCA Implementation an Evaluation of AS Parallel CG Benchmark on GPU Cluster with Proprietary Interconnect TCA Kazuya Matsumoto 1, orihisa Fujita 2, Toshihiro Hanawa 3, an Taisuke Boku 1,2 1 Center for Computational

More information

Adjacency Matrix Based Full-Text Indexing Models

Adjacency Matrix Based Full-Text Indexing Models 1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,

More information

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach Nishi Sharma, Vanna Verma Abstract Wireless sensor networks (WSNs) is one of the emerging fiel of research in recent era

More information

NAND flash memory is widely used as a storage

NAND flash memory is widely used as a storage 1 : Buffer-Aware Garbage Collection for Flash-Base Storage Systems Sungjin Lee, Dongkun Shin Member, IEEE, an Jihong Kim Member, IEEE Abstract NAND flash-base storage evice is becoming a viable storage

More information

Parallel Directionally Split Solver Based on Reformulation of Pipelined Thomas Algorithm

Parallel Directionally Split Solver Based on Reformulation of Pipelined Thomas Algorithm NASA/CR-1998-208733 ICASE Report No. 98-45 Parallel Directionally Split Solver Base on Reformulation of Pipeline Thomas Algorithm A. Povitsky ICASE, Hampton, Virginia Institute for Computer Applications

More information

MODULE VII. Emerging Technologies

MODULE VII. Emerging Technologies MODULE VII Emerging Technologies Computer Networks an Internets -- Moule 7 1 Spring, 2014 Copyright 2014. All rights reserve. Topics Software Define Networking The Internet Of Things Other trens in networking

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stoylar arxiv:15.4984v1 [cs.ni] 27 May 21 Abstract

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

Considering bounds for approximation of 2 M to 3 N

Considering bounds for approximation of 2 M to 3 N Consiering bouns for approximation of to (version. Abstract: Estimating bouns of best approximations of to is iscusse. In the first part I evelop a powerseries, which shoul give practicable limits for

More information

Optimal Distributed P2P Streaming under Node Degree Bounds

Optimal Distributed P2P Streaming under Node Degree Bounds Optimal Distribute P2P Streaming uner Noe Degree Bouns Shaoquan Zhang, Ziyu Shao, Minghua Chen, an Libin Jiang Department of Information Engineering, The Chinese University of Hong Kong Department of EECS,

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks Optimal Routing an Scheuling for Deterministic Delay Tolerant Networks Davi Hay Dipartimento i Elettronica olitecnico i Torino, Italy Email: hay@tlc.polito.it aolo Giaccone Dipartimento i Elettronica olitecnico

More information

Chapter 9 Memory Management

Chapter 9 Memory Management Contents 1. Introuction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threas 6. CPU Scheuling 7. Process Synchronization 8. Dealocks 9. Memory Management 10.Virtual Memory

More information

WLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic

WLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic WLAN Inoor Positioning Base on Eucliean Distances an Fuzzy Logic Anreas TEUBER, Bern EISSFELLER Institute of Geoesy an Navigation, University FAF, Munich, Germany, e-mail: (anreas.teuber, bern.eissfeller)@unibw.e

More information

Image Segmentation using K-means clustering and Thresholding

Image Segmentation using K-means clustering and Thresholding Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,

More information

Cloud Search Service Product Introduction. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

Cloud Search Service Product Introduction. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD. 1.3.15 Issue 01 Date 2018-11-21 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Lt. 2019. All rights reserve. No part of this ocument may be reprouce or transmitte in any form or by any

More information

Dynamic Capacity Allocation in OTN Networks

Dynamic Capacity Allocation in OTN Networks Communications an Network, 2015, 7, 43-54 Publishe Online February 2015 in SciRes. http://www.scirp.org/journal/cn http://x.oi.org/10.4236/cn.2015.71005 Dynamic Capacity Allocation in OTN Networks Maria

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information