Net_CA: A Tool for Simulation and Modeling of Wired/Wireless Computer Networks based on Cellular Automata

Size: px
Start display at page:

Download "Net_CA: A Tool for Simulation and Modeling of Wired/Wireless Computer Networks based on Cellular Automata"

Transcription

1 Net_CA: A Tool for Simulation and Modeling of Wired/Wireless Computer Networks based on Cellular Automata Vasilios Mardiris 1, Georgios Ch. Sirakoulis 1, Charilaos Mizas 1, Ioannis Karafyllidis 1, and Adonios Thanailakis 1 1 Democritus University of Thrace, Department of Electrical and Computer Engineering, Laboratory of Electrical and Electronic Materials Technology, GR Xanthi, Greece {mardiris, mizas}@teikav.edu.gr {gsirak, ykar, athanail}@ee.duth.gr Abstract. A tool for simulation and modeling of wired/wireless computer networks based on Cellular Automata (CAs), is presented. More specifically, a two-dimensional NaSch CA model for computer network simulation has been developed and implemented in the proposed tool. Furthermore, algorithms for connectivity evaluation, system reliability evaluation and shortest path computation in a wired/wireless computer network have also been implemented. The Net_CA system was designed and developed as an interactive tool that offers automated modeling with the assistance of a dynamic and user friendly graphical environment. The simulation algorithms developed in the present work offer high flexibility. Furthermore, connection reliability and other important parameters are inputs to the algorithms rendering Net_CA a very reliable and fast simulator for wireless networks, ad hoc networks and, generally, for low connection reliability networks. (Research Paper, Keywords: Computer Networks, Cellular Automata, Simulation, Modeling, Connectivity, Reliability) 1 Introduction The proliferation of computing and communications as well as the ever-increasing number of Internet users is driving a revolutionary change in our information society. The requirements for large scale wired and/or wireless computer networks characterized by extremely complicated topologies and, in the same time, by huge bandwidth rates are truly skyrocketing [1]. It is obvious that such complicated computer networks demand meticulous design in topology level, careful choice of the proper communication protocols as well as secured transition of extremely big data with high bandwidth rates. Furthermore, the determination of the parameters set applicable to the aforementioned computer networks that are responsible for their high speed functionality is an extremely difficult task. As a result, modeling the performance of computer networks is without any doubt a crucial and difficult interdisciplinary subject. The principal idea behind simulation modelling is to represent accurately the

2 topology and functions performed in a network in order to obtain statistical results about the network s performance under investigation [2]. Computer networks can be categorized based on the nature of data transmission in three different types; namely, the copper networks where the electric voltage is used as the transmission medium, the optical networks where the light is used and finally the wireless networks where electromagnetic waves are used for the transmission. Because of the pronounced freedom of node movement in a wireless computer network and the undersized connections found in it, a computer network model is indispensable [3]. Computer network models should be a simplified representation of the examined system and hence, only important features should be focussed on [4]. In order to model accurately real computer networks and allow predictive simulation during technology research and development, a system, named Net_CA, was constructed and is presented in this paper. The Net_CA is an interactive simulation tool that includes a Graphical User Interface [GUI] which has been implemented using Tcl/Tk facilities [5]. It simulates the network operation and provides performance measurements. No programming is required as network descriptions are created using a graphical user interface, which is designed to model a wide variety of networks. The proposed system includes four different algorithms for computer network modelling all based on Cellular Automata (CAs). CAs are models of physical systems, where space and time are discrete and interactions are local and they can easily handle complicated boundary and initial conditions, inhomogeneities and anisotropies [6]. CAs are very effective in simulating systems and solving scientific problems, because they can capture the essential features of systems where global behavior arises from the collective effect of simple components which interact locally [7-8]. As a result, first of all a two dimensional CA NaSch computer network model was developed and implemented in Net_CA system. This algorithm is based on the NaSch CA highway traffic model and on the corresponding one-dimensional analogous NaSch CA computer network model found in literature [9-10]. A CA algorithm for network connectivity evaluation, a CA algorithm for network reliability evaluation and a CA shortest path network connectivity algorithm [11] were developed and implemented in the Net_CA system. The proposed Net_CA succeeds a mere numerical agreement with the examined computer network and matches the simulated system s own structure, its topology, its connectivity and every deep network property. The paper is organised as follows: In Section 2 a detailed mathematical description of Cellular Automata is given. The Net_CA simulation tool and all the corresponding CA algorithms are presented in full detail with examples in Section 3. Finally, the conclusions are drawn in Section 4. 2 Cellular Automata In this section a more formal definition of a CA will be presented [12]. In general, a CA requires: 1. A regular lattice of cells covering a portion of a d-dimensional space;

3 2. A set ( r t) = { C ( r, t), C ( r, t),..., C ( r, t) } C of variables attached to each site, 1 2 m r of the lattice giving the local state of each cell at the time t = 0, 1, ; 3. A rule R={R 1, R 2,, R m } which specifies the time evolution of the states C ( r,t) in the following way: C ( r, t + 1) = R ( C( r, t), C( r + δ 1, t), C( r + δ 2, t),..., C( r + δ q t ) j j, where r + δ k designates the cells belonging to a given neighbourhood of cell r. In the above definition, the rule R is identical for all sites, and it is applied simultaneously to each of them, leading to a synchronous dynamics. It is important to notice that the rule is homogeneous, i.e. it does not depend explicitly on the cell position r. However, spatial (or even temporal) inhomogeneities can be introduced by ascribing definite and permanent values for some states ( r) (1) C j in some given locations of the lattice. In the above definition, the new state at time t+1 is only a function of the previous state at time t. It is sometimes necessary to have a longer memory and introduce a dependence on the states at time t-1, t-2,, t-k. Such a situation is already included in the definition, if one keeps a copy of the previous state in the current state. The neighbourhood of cell r is the spatial region in which a cell needs to search in its vicinity. In principle, there is no restriction on the size of the neighbourhood, except that it is the same for all cells. However, in practice, it is often made up of adjacent cells only. For two-dimensional CA, two neighborhoods are often considered: the von Neumann and Moore neighbourhoods [12]. Extending the neighbourhood leads to various types of boundary conditions such as periodic (or cyclic), fixed, adiabatic or reflection [12]. 3 Net_CA Simulation Tool Net_CA is an automated computer network modelling system. In computer network modelling, graphic output is a necessary tool for rapid and clear understanding of computation results. Thus user-friendly tools allowing users to interact with the system is a basic part of the Net_CA s environment. Net_CA s user interface has been implemented using Tcl/Tk GUI s facilities, enabling interactive simulation. The proposed tool is platform independent. The simulation results are produced using the four aforementioned CA algorithms. More details regarding these algorithms are given later on this section. All algorithms codes were also developed with the usage of Tcl/Tk and interact instantly with the user s defined parameters. These parameters are the topology of the examined network, the nodes of the network and their maximum number of data packets and corresponding boundary conditions, as well as the links between the nodes of the network and their bandwidth, reliability and cost. Each algorithm is executed using

4 the corresponding button found in the top of the Net_CA s initialization window. The aforementioned parameters remain unchanged during the simulation. It should be mentioned that Net_CA does not impose any a priori limitations on these parameters which are modifiable and can be changed interactively. Simulation results can be looked at in graphical form. Furthermore, the case of false values given to one or more parameters is examined by the system and the user is forced to correct these values. The Net_CA includes a help window that gives information related to the scope, the abilities and the usage of the system. A demo version of the presented system would be available after the presentation of the paper from the The two-dimensional NaSch network model The original NaSch network model is a one-dimension CA model for computer network, which is similar to the NaSch model used in the research on road traffic [9-10]. In the proposed simulation tool a two-dimensional NaSch network model is presented for the first time. Unlike the NaSch traffic model, the NaSch network model is composed of two kinds of cells, node cells and link cells. The node cells represent computers, routers, and switchers in a computer network. The link cells represent the lines of communication between nodes. Node cells are allowed to have more than one data packets at any time, while link cells can be occupied by at most one packet at a given instant. The two-dimensional NaSch network model results in an extended Moore neighboohood, its size corresponding to the topology of the simulated network. It should be mentioned that every cell of the extended Moore neighbourhood is found in one of three possible states: (a) node cell, (b) link cell and (c) non active. The number of link cells connecting two adjacent node cells represents the bandwidth of network. A large number of link cells results in more time for transferring packets from a node cell to the other. This directly leads to a lower bandwidth. The bandwidth reaches the maximum if no link cell exists between two adjacent node cells. In this case, packets can be directly transferred from one node to the other. This implies that the link cell is not necessary and the NaSch network model can consist of node cells only. The state of cell can be characterized by the number of packets it has. Obviously, for a node cell, it can take an arbitrary value from 0 to N, where N is the maximum number of packets a node cell can hold. However, the state of a link cell can have only the value of 0 or 1. Each packet in the NaSch network model has a velocity property. This property holds information of how the packet move ahead in the next time step. For the sake of simplicity, the maximum velocity of a packet is limited to 1, that is, it must be taken 0 or 1. The developed two-dimensional NaSch network model is assumed to obey the evolution rules as follows: 1. Acceleration: For packets that are in the link cells or at the front of the queue of node cells, their velocities are set to be 1. The velocities of other packets remain unchanged. 2. Slowing down: The velocity of a packet will reduce to 0, if the packet satisfies any of the alternatives:

5 For any cell that holds one packet, the next adjacent one is a link cell and only one packet is occupied in this link node. For any cell that holds one packet, the next adjacent one is a node cell and the number of packets in this link node has reached the maximum. 3. Randomization: For each node cell, slow down the packet lined at the front of queue and set its velocity to 0 with probability p, if this cell is not empty (or it holds at least one packet). 4. Exit of packets from node cells: In this case the followings result: If N>L, then L packages of the node attain to velocity 1. If N<L, then N packages of the node cell, attain to velocity 1 and move to random departure cells; where, in both cases, N is the number of packages of node cell, L is the number of the links cells found in the exit of node cell and could possible receive data. 5. Entrance of packets in node cells: In this case the followings result: If N-N max >L, then L packages attain to velocity 1 and enter the node cell. If N-N max <L, then N-N max packages, chosen randomly from the L link cells found in the entrance of the examined node cell, attain to velocity 1 and enter the node cell; where, in both cases, N is the number of packages of node cell, N max is the maximum number of packages that can be storied in node cell, L is the number of the links cells found in the entrance of node cell and could possible send data (are occupied by data package). 6. Packet motion: Each packet goes ahead according to its velocity. If its destination is a node cell, it will be added to the end of the queue. In step 3, the randomization, should be attracted special attention. The randomization is regarded as the abstract of the forwarding packet process of switchers or routers in a real world network. Through the above steps, we can have dynamic behaviors of network. As mentioned above, we use several parameters, including the number of node cells N, the number of link cells L, the capacity of node cell Q, the random probability p, and the packet density ρ, for describing the NaSch network model. Thus the NaSch network model is generally written as CA(N,L,Q,p,ρ) for convenience. An example of the proposed two-dimensional NaSch model for modelling a computer network through the Net_CA simulation tool is depicted in Figure 1. The Net_CA gives the opportunity to the user to define the minimum number of link cells corresponding to the maximum bandwidth connection. In other words, the user defines the connection with the minimum bandwidth which would be used by the system as the basis for the computation of the link cells for the rest connections depending on the bandwidth of each one. Additionally, the white coloured link cells correspond to empty of data packets, while the red ones hold data packets. 3.2 The s-t connectivity evaluation algorithm The problem of s t connectivity evaluation consists in finding if there is a path from a source node s to a terminal node t. Ascertaining the connectivity of the network requires knowledge of the cut sets or path sets of the system [9] or a depth-first procedure [10 12]. To address the problem, a generalised class of Boolean networks will

6 be used: each node has a binary OR state machine as local transition function with k inputs and m outputs. Fig. 1. The Net_CA simulation tool for the modeling of computer network with the usage of NaSch model after the initialization of the computer network. Let G=(N, A) be a graph, where N is the set of n nodes, A N N is the set of arcs and L i is the neighbourhood of the node i. That is, each node i is mapped to a cell whose neighbourhood is the set of nodes connected to it by its input arcs. Source node s has one input arc and terminal node t has one output arc. Note that in a computer network, each node corresponds to a computer. The state w(i) of each node is binary, with w(i)=1 corresponding to the activated state and w(i)=0 to the quiescent state. Each node i performs an OR Boolean transition function over the states of the nodes in its neighbourhood. That is: [ ( j),..., w( k) ], where j k Λi w i) = OR w,..., ( (2) To determine if there is a path from a source node s to a terminal node t, the CA propagates information from one node to another: each node is activated if there is at least one activated node in its neighbourhood. In this way, a path of activated nodes from node s to node t could be generated. Initially, all nodes are in the quiescent state and the source node s is activated. Then each node executes its transition function, just waiting for the activation of any of its neighbors. The computation ends either when node t is activated or the process

7 stagnates. The longest s t path in G consists of n-1 nodes, therefore the s t connectedness can be computed in O(n) time. The basic algorithm is: 1. Set all nodes in the quiescent state 2. Activate the input node s 3. Iteration=1 4. Update each node state in parallel by transition formula (2) 5. Iteration=iteration+1 6. If node t is activated, then stop: a path between s and t is found 7. If iteration < n-1 go to 4, else 8. If node t is in the quiescent state then s t path does not exist. An example of the proposed s-t connectivity evaluation algorithm using the Net_CA simulation tool is depicted in Figure 2. In the beginning, the starting node s is coloured red while all the other nodes are coloured yellow. In the following time step the nodes connected to the starting node s, with connectivity direction pointing from the s node to them are coloured red and the process keeps on going till the ending node t is coloured red. Then a message of success is shown in the upper right corner of the Net_CA simulation tool screen. Otherwise a proper message informs instantly the user about the inability of finding a connectivity path between the examined nodes of the computer network. Fig. 2. The final screen of the Net_CA simulation tool for the s-t connectedness evaluation algorithm applied to the given topology of the considered computer network.

8 3.3 System reliability evaluation algorithm Let us consider a system with n components and its network representation. Each component has two states (failure and success) and component failures are independent events. Each arc, between node i and j, represents a component with associated reliability r ij. The state of each arc x ij can be evaluated using its reliability and a random number U, distributed uniformly between [0, 1], as: x ij 1 (success state) if U r (3) ij = 0 (failure state) if 0 U rij To take into account the probabilistic nature of each arc, the Boolean transition function for each node Eq. (2) is written as: w(i)=or [AND(w(j),x ji ),, AND(w(k),x ki )], j,..., k (4) In order to perform a Monte-Carlo reliability evaluation with the Number of Evaluation (NE) given, we proceed as follows: 1.. Set iteration=1 2. Generate a random system state X. 3. Using CA algorithm evaluate if there is a path. 4. If there is a path then update number of good system states. 5. Iteration=iteration If iteration < NE go to 2, else STOP. At the end, we can estimate the system reliability as: Reliabilit y = Number of System States with connectivity NE The presented system reliability evaluation algorithm has been implemented in the proposed Net_CA simulation tool and tested with a simple example shown in Figure 3. After the definition of the starting node s and the ending node t of this computer network topology, the previously described reliability evaluation algorithm is used. First, the presented network connections are examined about the status of their function according to the aforementioned probabilistic model. Then, the s-t connectedness evaluation algorithm is executed and the user has the opportunity to examine if there is a physical connection between the nodes of the specified network. Finally, the reliability is calculated using Eq. (5). It should be mentioned that the working connections are displayed with the help of continuing arrows and the non-working connections are displayed with dashed arrows. The final number of the execution time steps of the proposed system reliability evaluation algorithm is determined by the user. i (5)

9 Fig. 3. The Net_CA Simulation tool for the modeling of computer network with the usage of system reliability evaluation algorithm. 3.4 Shortest path computation The problem of finding the shortest path (SP) from a single source to a single destination in a graph arises as a sub-problem to many broader problems. In general, different path metrics are used for different application. For example, in communication systems, if each link cost is 1, then the minimum number of hubs is found. However, cost can also represent the propagation delay, the link congestion or the reliability of each link. In the latter case, if the individual communication links operate independently, then the problem can be stated as to find what path has the maximum reliability. Let G=(N, A) be a graph, where N is the set of n nodes, A N N is the set of arcs and L i is the neighbourhood of the node i. That is, each node i is mapped to a cell whose neighbourhood is the set of nodes connected to it by its input arcs. Associated with each arc ( p, q) A is a non-negative number. C pq stands for the cost of arc from node p to node q. Non-existing arc costs are set to infinite. Let P st be a path from a source node s to a destination node t, defined as the set of consecutive connected nodes: P st ={s; n 1 ; n 2 ; ; n i ; t}. The state of each node, at each time step t s, is 1 2 represented by a vector with two entries ( t ) = V ( t ), V ( t ) : the first com- V i s i s> { } ponent is a pointer to the previous node in the path, while the second is the cost of the i s

10 1 partial path up to node i. V i ( t s ) is not necessary for evaluating the shortest path length, but it is used only for indicating the shortest path itself. The basic algorithm is: 1. Initialise the state of the node as V s (0)={s,0} and V i (0)={i, }, i s, t s =0. k L that minimise 2. Synchronously update each automaton i, i s finding i 2 2 ( t ) = ( V ( t + C ) or, in case of conflict, minimise V k ( t s ) and set U i, k s k s ) k, i 2 { k, ( V ( t ) C )} V i ( ts 1) = k s + k, i t s =t s If t s =n-1 or the process stagnates stop, else go to 2. The minimum s t path cost is the second component of the state vector of node t. In case this value is infinity, then there exists no s t path. The results of the implementation of the presented shortest path computation algorithm to the proposed Net_CA computer network simulation system are depicted in Figure 4. As before the user defines the starting node s and the ending node t of the given computer network topology. During the execution of the aforementioned algorithm each node is described by a pair of values, one for its number (name) according to the cost of the connection up to it, and the other for the minimum cost of connection of the starting node to the examined node. After the execution of the algorithm the shortest connectivity path between nodes s and t is colored yellow. Fig. 4. The final screen of the Net_CA system during the execution of the shortest path algorithm in order to find the shortest connectivity path between nodes s and t.

11 4 Conclusions Net_CA, a tool for simulation and modeling of wired/wireless computer networks based on CAs, was presented. More specifically, a two-dimensional NaSch CA model for computer network simulation has been developed and implemented in the proposed tool. Furthermore, algorithms for connectivity evaluation, system reliability evaluation and shortest path computation in a wired/wireless computer network have also been implemented. The Net_CA system was designed and developed as an interactive tool that offers automated modeling with the assistance of a dynamic and user friendly graphical environment. Net_CA s user interface has been implemented using Tcl/Tk enabling platform independence and possible cooperation with other well known computer network simulation tools based on Tcl/Tk, like ns2. Furthermore, connection reliability and other important parameters are inputs to the algorithms rendering Net_CA a very reliable and fast simulator for wireless networks, ad hoc networks and, generally, for low connection reliability networks. The proposed system can be easily modified enabling the modeling of computer network protocols like TCP/IP. Finally, the inherent parallelism of the proposed CA algorithms and its easy VLSI implementation make it suitable for real-time applications in the field of computer networks. References 1. Weiser, M.: The Computer for the Twenty-First Century. Scientific American. 265 (1991) Gralewitz, M., Michel, A., Stipidis, E., Ali, F.H.: Modelling and simulation of DSP using IP and ATM: illustrative comparisons in COMNET III. Simulation Modelling Practice and Theory. 12 (2004) Tanenbaum, A.S.: Computer Networks. 2 nd edn. Prentice Hall, Englewood Cliffs NJ (1988) 4. Tsaoussidis, V., Zhang, C.: TCP-Real: Receiver-oriented Congestion Control. The Journal of Computer Networks. 40 (2002) Welch, B., Jones, K., Hobbs, J.: Practical Programming in Tcl and Tk. 4th edn. Prentice Hall, Englewood Cliffs NJ (2003) 6. von Neumann, J.: Theory of Self-Reproducing Automata. University of Illinois Press, Urbana IL (1996) 7. Feynman, R.P.: Simulating physics with computers. International Journal of Theoretical Physics. 21 (1982) Wolfram, S.: Theory and Applications of Cellular Automata. World Scientific, Singapore (1986) 9. Ren, Z., Deng, Z., Sun, Z.: Cellular automaton modeling of computer network. Computer Physics Communications. 144 (2002) Nagel, K., Schreckenberg, M.: A cellular automaton model for freeway traffic. Journal de Phys. I. 2 (1992) Rocco, C.M.S., Moreno, J.A.: Network reliability assessment using a cellular automata approach. Reliability Engineering and System Safety. 78 (2002) Chopard, B., Droz, M.: Cellular Automata Modeling of Physical systems. Cambridge University Press, Cambridge (1998)

Application of Two-dimensional Periodic Cellular Automata in Image Processing

Application of Two-dimensional Periodic Cellular Automata in Image Processing International Journal of Computer, Mathematical Sciences and Applications Serials Publications Vol. 5, No. 1-2, January-June 2011, pp. 49 55 ISSN: 0973-6786 Application of Two-dimensional Periodic Cellular

More information

7. Traffic Simulation via Cellular Automata

7. Traffic Simulation via Cellular Automata EX7CellularAutomataForTraffic.nb 1 7. Traffic Simulation via Cellular Automata From Chapter 12 (mainly) of "Computer Simulations with Mathematica", Gaylord & Wellin, Springer 1995 [DCU library ref 510.2855GAY]

More information

Determining the minimal cut sets and Fussell-Vesely importance measures in binary network systems by simulation

Determining the minimal cut sets and Fussell-Vesely importance measures in binary network systems by simulation Safety and Reliability for Managing Risk Guedes Soares & Zio (eds) 2006 Taylor & Francis Group, London, ISBN 0-415-41620-5 Determining the minimal cut sets and Fussell-Vesely importance measures in binary

More information

CELLULAR AUTOMATA IN MATHEMATICAL MODELING JOSH KANTOR. 1. History

CELLULAR AUTOMATA IN MATHEMATICAL MODELING JOSH KANTOR. 1. History CELLULAR AUTOMATA IN MATHEMATICAL MODELING JOSH KANTOR 1. History Cellular automata were initially conceived of in 1948 by John von Neumann who was searching for ways of modeling evolution. He was trying

More information

COMPUTER SIMULATION OF COMPLEX SYSTEMS USING AUTOMATA NETWORKS K. Ming Leung

COMPUTER SIMULATION OF COMPLEX SYSTEMS USING AUTOMATA NETWORKS K. Ming Leung POLYTECHNIC UNIVERSITY Department of Computer and Information Science COMPUTER SIMULATION OF COMPLEX SYSTEMS USING AUTOMATA NETWORKS K. Ming Leung Abstract: Computer simulation of the dynamics of complex

More information

Cellular Automata. Cellular Automata contains three modes: 1. One Dimensional, 2. Two Dimensional, and 3. Life

Cellular Automata. Cellular Automata contains three modes: 1. One Dimensional, 2. Two Dimensional, and 3. Life Cellular Automata Cellular Automata is a program that explores the dynamics of cellular automata. As described in Chapter 9 of Peak and Frame, a cellular automaton is determined by four features: The state

More information

Generalized Coordinates for Cellular Automata Grids

Generalized Coordinates for Cellular Automata Grids Generalized Coordinates for Cellular Automata Grids Lev Naumov Saint-Peterburg State Institute of Fine Mechanics and Optics, Computer Science Department, 197101 Sablinskaya st. 14, Saint-Peterburg, Russia

More information

Complex Dynamics in Life-like Rules Described with de Bruijn Diagrams: Complex and Chaotic Cellular Automata

Complex Dynamics in Life-like Rules Described with de Bruijn Diagrams: Complex and Chaotic Cellular Automata Complex Dynamics in Life-like Rules Described with de Bruijn Diagrams: Complex and Chaotic Cellular Automata Paulina A. León Centro de Investigación y de Estudios Avanzados Instituto Politécnico Nacional

More information

Modelling traffic congestion using queuing networks

Modelling traffic congestion using queuing networks Sādhanā Vol. 35, Part 4, August 2010, pp. 427 431. Indian Academy of Sciences Modelling traffic congestion using queuing networks TUSHAR RAHEJA Mechanical Engineering Department, Indian Institute of Technology

More information

Two-dimensional Totalistic Code 52

Two-dimensional Totalistic Code 52 Two-dimensional Totalistic Code 52 Todd Rowland Senior Research Associate, Wolfram Research, Inc. 100 Trade Center Drive, Champaign, IL The totalistic two-dimensional cellular automaton code 52 is capable

More information

Network Routing Protocol using Genetic Algorithms

Network Routing Protocol using Genetic Algorithms International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:0 No:02 40 Network Routing Protocol using Genetic Algorithms Gihan Nagib and Wahied G. Ali Abstract This paper aims to develop a

More information

Chapter-4. Simulation Design and Implementation

Chapter-4. Simulation Design and Implementation Chapter-4 Simulation Design and Implementation In this chapter, the design parameters of system and the various metrics measured for performance evaluation of the routing protocols are presented. An overview

More information

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr. Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 343-396 1 5.1. NETWORK LAYER DESIGN ISSUES 5.2. ROUTING ALGORITHMS 5.3. CONGESTION CONTROL ALGORITHMS 5.4.

More information

We will discuss about three different static routing algorithms 1. Shortest Path Routing 2. Flooding 3. Flow Based Routing

We will discuss about three different static routing algorithms 1. Shortest Path Routing 2. Flooding 3. Flow Based Routing In this lecture we will discuss about Routing algorithms Congestion algorithms Lecture 19 The routing algorithm is that part of the network layer software, which is responsible for deciding which output

More information

Robots & Cellular Automata

Robots & Cellular Automata Integrated Seminar: Intelligent Robotics Robots & Cellular Automata Julius Mayer Table of Contents Cellular Automata Introduction Update Rule 3 4 Neighborhood 5 Examples. 6 Robots Cellular Neural Network

More information

Chapter 8 OSI Physical Layer

Chapter 8 OSI Physical Layer Chapter 8 OSI Physical Layer Upper OSI layer protocols prepare data from the human network for transmission to its destination. The Physical layer controls how data is placed on the communication media.

More information

Self-formation, Development and Reproduction of the Artificial System

Self-formation, Development and Reproduction of the Artificial System Solid State Phenomena Vols. 97-98 (4) pp 77-84 (4) Trans Tech Publications, Switzerland Journal doi:.48/www.scientific.net/ssp.97-98.77 Citation (to be inserted by the publisher) Copyright by Trans Tech

More information

Outline Introduction to CA (LGA HPP model) CA computation model for real CA applications Detailed computation method Validate the model using specific

Outline Introduction to CA (LGA HPP model) CA computation model for real CA applications Detailed computation method Validate the model using specific Performance evaluation of FPGA-based Cellular Automata accelerators S. Murtaza, A. G. Hoekstra, P. M. A. Sloot Section Computational Science Institute for Informatics University of Amsterdam Amsterdam,

More information

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE)

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE) An Effect of Route Caching Scheme in DSR for Vehicular Adhoc Networks Poonam kori, Dr. Sanjeev Sharma School Of Information Technology, RGPV BHOPAL, INDIA E-mail: Poonam.kori@gmail.com Abstract - Routing

More information

L Modeling and Simulating Social Systems with MATLAB

L Modeling and Simulating Social Systems with MATLAB 851-0585-04L Modeling and Simulating Social Systems with MATLAB Lecture 4 Cellular Automata Karsten Donnay and Stefano Balietti Chair of Sociology, in particular of Modeling and Simulation ETH Zürich 2011-03-14

More information

Systolic Super Summation with Reduced Hardware

Systolic Super Summation with Reduced Hardware Systolic Super Summation with Reduced Hardware Willard L. Miranker Mathematical Sciences Department IBM T.J. Watson Research Center Route 134 & Kitichwan Road Yorktown Heights, NY 10598 Abstract A principal

More information

Chapter 2 Mobility Model Characteristics

Chapter 2 Mobility Model Characteristics Chapter 2 Mobility Model Characteristics Abstract The salient characteristics of mobility models of mobile nodes in mobile ad hoc networks are described. We have described how the different mobility models

More information

AN INSIGHT INTO CELLULAR AUTOMATA-BASED IMPULSE NOISE FILTRATION ALGORITHMS

AN INSIGHT INTO CELLULAR AUTOMATA-BASED IMPULSE NOISE FILTRATION ALGORITHMS AN INSIGHT INTO CELLULAR AUTOMATA-BASED IMPULSE NOISE FILTRATION ALGORITHMS Zubair Jeelani 1, Fasel Qadir 2 1 Department of Computer Science, University of Kashmir, India 2 Department of Computer Science,

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Congestion Propagation among Routers in the Internet

Congestion Propagation among Routers in the Internet Congestion Propagation among Routers in the Internet Kouhei Sugiyama, Hiroyuki Ohsaki and Makoto Imase Graduate School of Information Science and Technology, Osaka University -, Yamadaoka, Suita, Osaka,

More information

Graph Adjacency Matrix Automata Joshua Abbott, Phyllis Z. Chinn, Tyler Evans, Allen J. Stewart Humboldt State University, Arcata, California

Graph Adjacency Matrix Automata Joshua Abbott, Phyllis Z. Chinn, Tyler Evans, Allen J. Stewart Humboldt State University, Arcata, California Graph Adjacency Matrix Automata Joshua Abbott, Phyllis Z. Chinn, Tyler Evans, Allen J. Stewart Humboldt State University, Arcata, California Abstract We define a graph adjacency matrix automaton (GAMA)

More information

Modeling Robot Path Planning with CD++

Modeling Robot Path Planning with CD++ Modeling Robot Path Planning with CD++ Gabriel Wainer Department of Systems and Computer Engineering. Carleton University. 1125 Colonel By Dr. Ottawa, Ontario, Canada. gwainer@sce.carleton.ca Abstract.

More information

A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks

A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks International Journal of Research in Advent Technology, Vol.6, No.8, August 218 A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks S. Mahalakshmi 1, Dr. K. Geetha 2

More information

Performance Analysis of Routing Techniques in Networks

Performance Analysis of Routing Techniques in Networks International Journal of Scientific and Research Publications, Volume 2, Issue 9, September 2012 1 Performance Analysis of Routing Techniques in Networks J.Mahesh, M.Antony Kumar P.M.R.Engineering College

More information

Modeling and Simulating Social Systems with MATLAB

Modeling and Simulating Social Systems with MATLAB Modeling and Simulating Social Systems with MATLAB Lecture 4 Cellular Automata Olivia Woolley, Tobias Kuhn, Dario Biasini, Dirk Helbing Chair of Sociology, in particular of Modeling and Simulation ETH

More information

GPU-based Distributed Behavior Models with CUDA

GPU-based Distributed Behavior Models with CUDA GPU-based Distributed Behavior Models with CUDA Courtesy: YouTube, ISIS Lab, Universita degli Studi di Salerno Bradly Alicea Introduction Flocking: Reynolds boids algorithm. * models simple local behaviors

More information

Performance Study of Routing Algorithms for LEO Satellite Constellations

Performance Study of Routing Algorithms for LEO Satellite Constellations Performance Study of Routing Algorithms for LEO Satellite Constellations Ioannis Gragopoulos, Evangelos Papapetrou, Fotini-Niovi Pavlidou Aristotle University of Thessaloniki, School of Engineering Dept.

More information

Netaji Subhash Engineering College, Technocity, Garia, Kolkata , India

Netaji Subhash Engineering College, Technocity, Garia, Kolkata , India Classification of Cellular Automata Rules Based on Their Properties Pabitra Pal Choudhury 1, Sudhakar Sahoo 2, Sarif Hasssan 3, Satrajit Basu 4, Dibyendu Ghosh 5, Debarun Kar 6, Abhishek Ghosh 7, Avijit

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

UCLA UCLA Previously Published Works

UCLA UCLA Previously Published Works UCLA UCLA Previously Published Works Title Parallel Markov chain Monte Carlo simulations Permalink https://escholarship.org/uc/item/4vh518kv Authors Ren, Ruichao Orkoulas, G. Publication Date 2007-06-01

More information

An Evolution of Mathematical Tools

An Evolution of Mathematical Tools An Evolution of Mathematical Tools From Conceptualization to Formalization Here's what we do when we build a formal model (or do a computation): 0. Identify a collection of objects/events in the real world.

More information

Steganography by using Logistic Map Function and Cellular Automata

Steganography by using Logistic Map Function and Cellular Automata Research Journal of Applied Sciences Engineering and Technology 4(3): 4991-4995 01 ISSN: 040-7467 Maxwell Scientific Organization 01 Submitted: February 0 01 Accepted: April 30 01 Published: December 01

More information

A Closed Asynchronous Dynamic Model of Cellular Learning Automata and its Application to Peer-to-Peer Networks

A Closed Asynchronous Dynamic Model of Cellular Learning Automata and its Application to Peer-to-Peer Networks A Closed Asynchronous Dynamic Model of Cellular Learning Automata and its Application to Peer-to-Peer Networks Ali Mohammad Saghiri *, Mohammad Reza Meybodi Soft Computing Laboratory, Computer Engineering

More information

γ 2 γ 3 γ 1 R 2 (b) a bounded Yin set (a) an unbounded Yin set

γ 2 γ 3 γ 1 R 2 (b) a bounded Yin set (a) an unbounded Yin set γ 1 γ 3 γ γ 3 γ γ 1 R (a) an unbounded Yin set (b) a bounded Yin set Fig..1: Jordan curve representation of a connected Yin set M R. A shaded region represents M and the dashed curves its boundary M that

More information

Module 7 VIDEO CODING AND MOTION ESTIMATION

Module 7 VIDEO CODING AND MOTION ESTIMATION Module 7 VIDEO CODING AND MOTION ESTIMATION Lesson 20 Basic Building Blocks & Temporal Redundancy Instructional Objectives At the end of this lesson, the students should be able to: 1. Name at least five

More information

Cellular Learning Automata-Based Color Image Segmentation using Adaptive Chains

Cellular Learning Automata-Based Color Image Segmentation using Adaptive Chains Cellular Learning Automata-Based Color Image Segmentation using Adaptive Chains Ahmad Ali Abin, Mehran Fotouhi, Shohreh Kasaei, Senior Member, IEEE Sharif University of Technology, Tehran, Iran abin@ce.sharif.edu,

More information

Connection-Level Scheduling in Wireless Networks Using Only MAC-Layer Information

Connection-Level Scheduling in Wireless Networks Using Only MAC-Layer Information Connection-Level Scheduling in Wireless Networks Using Only MAC-Layer Information Javad Ghaderi, Tianxiong Ji and R. Srikant Coordinated Science Laboratory and Department of Electrical and Computer Engineering

More information

Cellular Automata + Parallel Computing = Computational Simulation

Cellular Automata + Parallel Computing = Computational Simulation Cellular Automata + Parallel Computing = Computational Simulation Domenico Talia ISI-CNR c/o DEIS, Università della Calabria, 87036 Rende, Italy e-mail: talia@si.deis.unical.it Keywords: cellular automata,

More information

ECE 333: Introduction to Communication Networks Fall 2001

ECE 333: Introduction to Communication Networks Fall 2001 ECE : Introduction to Communication Networks Fall 00 Lecture : Routing and Addressing I Introduction to Routing/Addressing Lectures 9- described the main components of point-to-point networks, i.e. multiplexed

More information

Cellular Automata and Roundabout Traffic Simulation

Cellular Automata and Roundabout Traffic Simulation Cellular Automata and Roundabout Traffic Simulation Enrico G. Campari 1, Giuseppe Levi 1, and Vittorio Maniezzo 2 1 Scienze dell Informazione dell Università di Bologna, sede di Cesena via Sacchi, 3 I-47023

More information

Data and Computer Communications Chapter 1 Data Communications, Data Networks, and the Internet

Data and Computer Communications Chapter 1 Data Communications, Data Networks, and the Internet Data and Computer Communications Chapter 1 Data Communications, Data Networks, and the Internet Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings,

More information

4.1 Introduction to Media and Devices

4.1 Introduction to Media and Devices Chapter 4 Network Hardware 4.1 Introduction to Media and Devices Many of the issues discussed in this course, such as topology, scalability, and speed, depend on hardware. Unlike many of your computer

More information

CROSS LAYER USING END-TO-END DELAY ASSESSMENT FOR ROUTING PROTOCOL IN VEHICULAR AD HOC NETWORK

CROSS LAYER USING END-TO-END DELAY ASSESSMENT FOR ROUTING PROTOCOL IN VEHICULAR AD HOC NETWORK CROSS LAYER USING END-TO-END DELAY ASSESSMENT FOR ROUTING PROTOCOL IN VEHICULAR AD HOC NETWORK Le Van Minh a,b, Yang MingChuan a, and Guo Qing a a Communication research center, Harbin Institute of Technology,

More information

Cellular Automata. Nicholas Geis. January 22, 2015

Cellular Automata. Nicholas Geis. January 22, 2015 Cellular Automata Nicholas Geis January 22, 2015 In Stephen Wolfram s book, A New Kind of Science, he postulates that the world as we know it and all its complexities is just a simple Sequential Dynamical

More information

Directed Graph for Finite-State Machine

Directed Graph for Finite-State Machine Directed Graph for Finite-State Machine Tito D. Kesumo Siregar (13511018) 1 Program Studi Teknik Informatika Sekolah Teknik Elektro dan Informatika Institut Teknologi Bandung, Jl. Ganesha 10 Bandung 40132,

More information

Network Connectivity and Mobility

Network Connectivity and Mobility Network Connectivity and Mobility BSAD 141 Dave Novak Topics Covered Lecture is structured based on the five elements of creating a connected world from the text book (with additional content) 1. Network

More information

UNIT 2 ROUTING ALGORITHMS

UNIT 2 ROUTING ALGORITHMS UNIT ROUTING ALGORITHMS Routing Algorithms Structure Page Nos..0 Introduction 3. Objectives 3. Flooding 3.3 Shortest Path Routing Algorithm 5.4 Distance Vector Routing 6.4. Comparison.4. The Count-to-Infinity

More information

Characterization of Boolean Topological Logics

Characterization of Boolean Topological Logics Characterization of Boolean Topological Logics Short Form: Boolean Topological Logics Anthony R. Fressola Denison University Granville, OH 43023 University of Illinois Urbana-Champaign, IL USA 61801-61802

More information

Bandwidth Efficient Distant Vector Routing for Ad Hoc Networks

Bandwidth Efficient Distant Vector Routing for Ad Hoc Networks Bandwidth Efficient Distant Vector Routing for Ad Hoc Networks Ralph Jansen and Bernd Freisleben Department of Electrical Engineering & Computer Science University of Siegen Hölderlinstr. 3 D 57068 Siegen

More information

Variations on Genetic Cellular Automata

Variations on Genetic Cellular Automata Variations on Genetic Cellular Automata Alice Durand David Olson Physics Department amdurand@ucdavis.edu daolson@ucdavis.edu Abstract: We investigated the properties of cellular automata with three or

More information

Switched Multimegabit Data Service

Switched Multimegabit Data Service CHAPTER 14 Chapter Goals Tell how SMDS works, and describe its components. Describe the operational elements of the SMDS environment, and outline its underlying protocol. Discuss related technologies.

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

THE ADJACENT VEHICLES QUERY ALGORITHM OF MICROSCOPIC TRAFFIC SIMULATION

THE ADJACENT VEHICLES QUERY ALGORITHM OF MICROSCOPIC TRAFFIC SIMULATION Association for Information Systems AIS Electronic Library (AISeL) PACIS 2014 Proceedings Pacific Asia Conference on Information Systems (PACIS) 2014 THE ADJACENT VEHICLES QUERY ALGORITHM OF MICROSCOPIC

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion

More information

Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud

Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud 2016 International Conference on Service Science, Technology and Engineering (SSTE 2016) ISBN: 978-1-60595-351-9 Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

Exploring Multiple Paths using Link Utilization in Computer Networks

Exploring Multiple Paths using Link Utilization in Computer Networks 7 Exploring Multiple Paths using Link Utilization in Computer Networks 1 Shalini Aggarwal, 2 Shuchita Upadhyaya 1 Teacher Fellow, Department of Computer Science & Applications, Kurukshetra University Kurukshetra,

More information

A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks

A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks S. Balachandran, D. Dasgupta, L. Wang Intelligent Security Systems Research Lab Department of Computer Science The University of

More information

UNIT 9C Randomness in Computation: Cellular Automata Principles of Computing, Carnegie Mellon University

UNIT 9C Randomness in Computation: Cellular Automata Principles of Computing, Carnegie Mellon University UNIT 9C Randomness in Computation: Cellular Automata 1 Exam locations: Announcements 2:30 Exam: Sections A, B, C, D, E go to Rashid (GHC 4401) Sections F, G go to PH 125C. 3:30 Exam: All sections go to

More information

A Quality of Service Decision Model for ATM-LAN/MAN Interconnection

A Quality of Service Decision Model for ATM-LAN/MAN Interconnection A Quality of Service Decision for ATM-LAN/MAN Interconnection N. Davies, P. Francis-Cobley Department of Computer Science, University of Bristol Introduction With ATM networks now coming of age, there

More information

CHAPTER 4 SIMULATION MODEL AND PERFORMANCE METRICS

CHAPTER 4 SIMULATION MODEL AND PERFORMANCE METRICS 59 CHAPTER 4 SIMULATION MODEL AND PERFORMANCE METRICS 4.1 OVERVIEW OF SIMULATION MODEL The performance of a MANET routing protocol under varying network conditions is to be evaluated in order to understand

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Development of a Maxwell Equation Solver for Application to Two Fluid Plasma Models. C. Aberle, A. Hakim, and U. Shumlak

Development of a Maxwell Equation Solver for Application to Two Fluid Plasma Models. C. Aberle, A. Hakim, and U. Shumlak Development of a Maxwell Equation Solver for Application to Two Fluid Plasma Models C. Aberle, A. Hakim, and U. Shumlak Aerospace and Astronautics University of Washington, Seattle American Physical Society

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Switched Multimegabit Data Service (SMDS)

Switched Multimegabit Data Service (SMDS) CHAPTER 14 Switched Multimegabit Data Service (SMDS) Background Switched Multimegabit Data Service (SMDS) is a high-speed, packet-switched, datagram-based WAN networking technology used for communication

More information

FIRM: A Class of Distributed Scheduling Algorithms for High-speed ATM Switches with Multiple Input Queues

FIRM: A Class of Distributed Scheduling Algorithms for High-speed ATM Switches with Multiple Input Queues FIRM: A Class of Distributed Scheduling Algorithms for High-speed ATM Switches with Multiple Input Queues D.N. Serpanos and P.I. Antoniadis Department of Computer Science University of Crete Knossos Avenue

More information

IMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS

IMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS IMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS E. Gnanamanoharan and R. Bensraj Department of Electrical Engineering, Annamalai University, Tamil Nadu, India

More information

Buffered Fixed Routing: A Routing Protocol for Real-Time Transport in Grid Networks

Buffered Fixed Routing: A Routing Protocol for Real-Time Transport in Grid Networks JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 18, NO. 6, JUNE 2000 757 Buffered Fixed Routing: A Routing Protocol for Real-Time Transport in Grid Networks Jinhan Song and Saewoong Bahk Abstract In this paper we

More information

ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFERENT MOBILITY MODELS

ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFERENT MOBILITY MODELS ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFERENT MOBILITY MODELS Natarajan Meghanathan 1 and Sireesha Gorla 1, Jackson State University, 1400 Lynch St, Jackson, MS, USA

More information

User Based Call Admission Control Policies for Cellular Mobile Systems: A Survey

User Based Call Admission Control Policies for Cellular Mobile Systems: A Survey User Based Call Admission Control Policies for Cellular Mobile Systems: A Survey Hamid Beigy and M. R. Meybodi Computer Engineering Department Amirkabir University of Technology Tehran, Iran {beigy, meybodi}@ce.aut.ac.ir

More information

SIMULATION OF ARTIFICIAL SYSTEMS BEHAVIOR IN PARAMETRIC EIGHT-DIMENSIONAL SPACE

SIMULATION OF ARTIFICIAL SYSTEMS BEHAVIOR IN PARAMETRIC EIGHT-DIMENSIONAL SPACE 78 Proceedings of the 4 th International Conference on Informatics and Information Technology SIMULATION OF ARTIFICIAL SYSTEMS BEHAVIOR IN PARAMETRIC EIGHT-DIMENSIONAL SPACE D. Ulbikiene, J. Ulbikas, K.

More information

Inspirations from Multiple Race Track Athletics for Multimedia Communications Traffic Engineering: Opportunities and Challenges

Inspirations from Multiple Race Track Athletics for Multimedia Communications Traffic Engineering: Opportunities and Challenges Inspirations from Multiple Race Track Athletics for Multimedia Communications Traffic Engineering: Opportunities and Challenges Sudip Misra Yale University Model M racers running towards a goal. Non-interfering

More information

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless

More information

PERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET

PERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET PERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET K. Venkateswarlu 1, G. Murali 2 1 M. Tech, CSE, JNTUA College of Engineering (Pulivendula), Andhra Pradesh, India 2 Asst.Prof (HOD), CSE,

More information

Travel-Time Sensitivity Kernels in Long-Range Propagation

Travel-Time Sensitivity Kernels in Long-Range Propagation Travel-Time Sensitivity Kernels in Long-Range Propagation Emmanuel Skarsoulis Foundation for Research and Technology Hellas Institute of Applied and Computational Mathematics P.O. Box 1385, GR-71110 Heraklion,

More information

Read Chapter 4 of Kurose-Ross

Read Chapter 4 of Kurose-Ross CSE 422 Notes, Set 4 These slides contain materials provided with the text: Computer Networking: A Top Down Approach,5th edition, by Jim Kurose and Keith Ross, Addison-Wesley, April 2009. Additional figures

More information

Routing. 4. Mar INF-3190: Switching and Routing

Routing. 4. Mar INF-3190: Switching and Routing Routing 4. Mar. 004 1 INF-3190: Switching and Routing Routing: Foundations! Task! To define the route of packets through the network! From the source! To the destination system! Routing algorithm! Defines

More information

Application of Totalistic Cellular Automata for Noise Filtering in Image Processing

Application of Totalistic Cellular Automata for Noise Filtering in Image Processing Journal of Cellular Automata, Vol. 7, pp. 207 221 Reprints available directly from the publisher Photocopying permitted by license only 2012 Old City Publishing, Inc. Published by license under the OCP

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 286 A SURVEY ON FACTORS EFFECTING ENERGY CONSUMPTION IN MANET Pooja Ph.D Scholar, Department of Computer Science

More information

Introduction. Communication

Introduction. Communication Introduction These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable copy and print a single copy of each

More information

A Fuzzy System for Adaptive Network Routing

A Fuzzy System for Adaptive Network Routing A Fuzzy System for Adaptive Network Routing A. Pasupuleti *, A.V. Mathew*, N. Shenoy** and S. A. Dianat* Rochester Institute of Technology Rochester, NY 14623, USA E-mail: axp1014@rit.edu Abstract In this

More information

Estimate the Routing Protocols for Internet of Things

Estimate the Routing Protocols for Internet of Things Estimate the Routing Protocols for Internet of Things 1 Manjushree G, 2 Jayanthi M.G 1,2 Dept. of Computer Network and Engineering Cambridge Institute of Technology Bangalore, India Abstract Internet of

More information

Liquefaction Analysis in 3D based on Neural Network Algorithm

Liquefaction Analysis in 3D based on Neural Network Algorithm Liquefaction Analysis in 3D based on Neural Network Algorithm M. Tolon Istanbul Technical University, Turkey D. Ural Istanbul Technical University, Turkey SUMMARY: Simplified techniques based on in situ

More information

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Geetha.S, Dr.G.Geetharamani Asst.Prof, Department of MCA, BIT Campus Tiruchirappalli, Anna University,

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

A Review: Optimization of Energy in Wireless Sensor Networks

A Review: Optimization of Energy in Wireless Sensor Networks A Review: Optimization of Energy in Wireless Sensor Networks Anjali 1, Navpreet Kaur 2 1 Department of Electronics & Communication, M.Tech Scholar, Lovely Professional University, Punjab, India 2Department

More information

Volume 2, Issue 11, November 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 11, November 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 11, November 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

Normal Algorithmetic Implementation of Cellular Automata

Normal Algorithmetic Implementation of Cellular Automata Normal Algorithmetic Implementation of Cellular Automata G. Ramesh Chandra, V. Dhana Lakshmi Dept. of Computer Science and Engineering VNR Vignana Jyothi Institute of Engineering & Technology Hyderabad,

More information

Principles of Wireless Sensor Networks

Principles of Wireless Sensor Networks Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 6 Routing Carlo Fischione Associate Professor of Sensor Networks e-mail:carlofi@kth.se http://www.ee.kth.se/ carlofi/

More information

Drawdown Automata, Part 1: Basic Concepts

Drawdown Automata, Part 1: Basic Concepts Drawdown Automata, Part 1: Basic Concepts Cellular Automata A cellular automaton is an array of identical, interacting cells. There are many possible geometries for cellular automata; the most commonly

More information

Two-dimensional Four Color Cellular Automaton: Surface Explorations

Two-dimensional Four Color Cellular Automaton: Surface Explorations Two-dimensional Four Color Cellular Automaton: Surface Explorations Robert H. Barbour School of Computing and Information Systems, Unitec New Zealand, Carrington Road, Mount Albert, Auckland, New Zealand

More information

Data Communication. Chapter # 1: Introduction. By: William Stalling

Data Communication. Chapter # 1: Introduction. By: William Stalling Data Communication Chapter # 1: By: Introduction William Stalling Data Communication The exchange of data between two devices via some form of transmission medium such as cable wire. For data communications

More information

Low Power using Match-Line Sensing in Content Addressable Memory S. Nachimuthu, S. Ramesh 1 Department of Electrical and Electronics Engineering,

Low Power using Match-Line Sensing in Content Addressable Memory S. Nachimuthu, S. Ramesh 1 Department of Electrical and Electronics Engineering, Low Power using Match-Line Sensing in Content Addressable Memory S. Nachimuthu, S. Ramesh 1 Department of Electrical and Electronics Engineering, K.S.R College of Engineering, Tiruchengode, Tamilnadu,

More information