An Analysis of Least-Cost Routing using Bellman Ford and Dijkstra Algorithms in Wireless Routing Network
|
|
- Garey Quinn
- 6 years ago
- Views:
Transcription
1 An Analysis of Least-Cost Routing using Bellman Ford and Dijkstra Algorithms in Wireless Routing Network Centre for Telecommunication Research and Innovation (CeTRI), Faculty of Electronic and Computer Engineering, Universiti Teknikal Malaysia Melaka, Durian Tunggal, Melaka, Malaysia Abstract In this paper, two different shortest paths routing algorithms in respect of performance are discussed. The first one is Dijkstra algorithm in routing network. The second one is a method that can be used in negative cycles known as Bellman Ford Algorithm. The paper is about a network creation with 9 nodes routes using MATLAB environment. Both algorithms have been applied and their performances are compared in terms of attenuation versus distance and throughput versus traffic load, a fully comparison table has been created and discussed. Keywords: Djikstra algorithm, Bellman-Ford algorithm, performance, attenuation 1. Introduction The evolution of networking and computer information technology caused a wide attention on research about graphical theory was reported in the last few years. Besides, a variety of graphical structures and algorithms have been projected in many fields of science too. Nowadays, the shortest path algorithm has become one of the most hotspot researches in graph theory and its algorithms. In addition, shortest path algorithm is used to control traffic engineering in Internet Protocol networks and to enhance networking and communications systems [1]. A lot of protocols have been tested in the wireless sensor networks such as Public Key Matrix [2], Ant Colony Principle [3], Clustering Hierarchical Structure [4] and many others. Dijkstra's and Bellman-Ford are the most popular algorithms in computer science and networking. They are also widely used in operations research. They have many attractions for both computer architectures and networks. Unfortunately, a number of important features of these interesting algorithms are not as clear to the normal users as they should be. Specifically, one of the results of the history of the algorithm is that they are generally regarded as a computer science method rather than as an operation research method. One of the main reasons for the acceptance of Dijkstra's and Bellman Algorithms is that they are the most important and useful algorithms existing for producing (precise) optimum solutions to most classes of shortest path problems. The point being that these classes of problems are very important in theoretical and educational purposes [5]. Dijkstra s algorithm is the route algorithm prepared by the Dutch computer scientist Edsger Dijkstra in 1956 and published in It is a graph search algorithm that explains the singlesource shortest route problem for a graph with nonnegative valued edge route costs. Therefore, it produces the shortest path tree. This system is widely used in routing and also as a subroutine in other graph algorithms. The disadvantage of the algorithm is that it cannot handle maps with negative path weights. The Bellman-Ford algorithm computes single-source shortest paths in a weighted graph or digraph, where some of the edge weights may be negative. This algorithm is a modification of the one published in 1952 by Richard E. Bellman [6] and that by Lester Randolph Ford [7]. Many applications can be used using these algorithms such as routing in wireless network for disaster situation [8], intelligent fire evacuation system [9], defense system International Journal of Advancements in Computing Technology(IJACT) Volume 5, Number 10, June 2013 doi : /ijact.vol5.issue
2 for mission planning approach using UAV [10], and also in automatic indoor navigation system [11]. 2. Djikstra and Bellman-Ford Algorithm Theory For a specified source vertex (node), the algorithm calculates all paths and finds out the path with lowest cost (i.e. the shortest distance) between that node and every other node in the network. It can also be used in calculating costs of shortest paths from a single node source to a single destination node by discontinuing the algorithm once the shortest path to the destination node has been reached. For example, if the node of the graph represents hosts and edge path costs represent path distances between pairs of nodes connected by a direct link, Dijkstra s algorithm can be used to find the minimum cost or shortest link path between one host and all other hosts in the network. Moreover, Dijkstra algorithm was highly motivated by Bellman's Principle of Optimality and that both theoretically and optimality related to the mathematical optimization method known as dynamic programming. One of the immediate implications of this perspective is that this widely used algorithm can be combined in the dynamic programming. The Bellman Ford algorithm sometimes denoted to as the Label Correcting Algorithm LCA, computes single-source shortest paths in a weighted routes (where some of the links weights may be negative). On the other hand and unlike Dijkstra, Bellman-Ford algorithm does not choose optimal set of nodes to scan: it simply iterates at all routes that may face in any directions. For each node, the algorithm may set as a "predecessor". At the end of the calculated route, the path from the distention to the source point can be traced by tracking the node, which was named as a predecessor in the path. Bellman-Ford algorithm goes over edges, not over nodes (vertices) of the graph, and gives all edges a directional value (thus route from node A to B can have different values comparing to the route from node B to A). A couple of reversed edges must be counted for every connection if the node relations in the task are not directional. The purpose of both algorithms describes the way to find the nodes shortest path problem. The primary difference in these algorithms is the fact that Dijkstra carries the overall information of the network in every node. On the other hand, Bellman-Ford algorithm doesn t care about the overall network costs where each node needs to know the cost or distances with immediately neighbor nodes. Another difference is when a negative cost is available in the routes. In such case the Dijkstra algorithm cannot be useful. However, if native values are in the network, the Bellman-Ford method can handle the process to calculate the minimum route [12] Djikstra s Algorithm Dijkstra's algorithm finds the shortest path length between two nodes in a graph. The algorithm works as follows; select the source node to be initial point. Then set the outline a set S of nodes, and set it to empty points. As the algorithm progresses, the set S will save those nodes to which a shortest path has been found. Later on, label the source node with 0, and add it into S. Next step we need to consider each node not in S connected by a route from the newly inserted node. Label the node not in S with the label of the newly inserted node and store the length of the route. But if the node not in S was already labeled, its new label will be min (label of newly inserted node + length of route, old label). Then pick a vertex not in S with the lowest label, and add it to S. Repeat the previous step, until the destination node is in S or there are no labeled nodes not in S. If the target is labeled; its label will be the path link distance from source to destination. If it is not labeled, there is no path. An upper bound of the running time of Dijkstra and Bellman algorithm on a graph with routes M and nodes N can be expressed as a function of M and N using the Big-O notation. Bellman complexity can be represented as O (mn), and Dijkstra O (n 2 ). 110
3 Figure 1. Dijkstra s algorithm [12] The instruction is theoretically as follows: to begin, mark the distance or cost to every intersection on the map with infinity. Even it is not infinity distance but to start the assumption and to note that node has not yet been visited; some alternatives of this technique simply leave the intersection unmarked. For the first iteration the current node will be the starting point and the distance to it will be labeled as zero. For the following iterations (after the first), the current intersection will be the closest unvisited node to the starting point. From the current point, update the distance to every unvisited node that is immediately neighbor to the first node or directly connected to it. This is ended by determining the sum of the distance between an unvisited intersection and the value of the current intersection, and relabeling the unvisited nodes with this value if it is less than its current value [12] Bellman-Ford Algorithm Bellman-Ford algorithm describes the shortest path in the general case in which routes of a certain network can have negative weight as long as the loop contains no negative cycles. For example it uses d[u] as an upper bound on the distance d [u,v] from u to v. The algorithm progressively reduces an estimate d[v] on the cost of the shortest path from the source node u to each node v in V until it reach the actual shortest-path. The algorithm yields Boolean True if the given digraph contains no negative cycles that are reachable from source node s otherwise it returns Boolean FALSE. Figure 2. Bellman Ford algorithm [13] 111
4 The algorithm is related to Dijkstra algorithm and very similar to, where the only difference is that when working with negative costs since it can t work with a greedy algorithm. A distributed variant of the Bellman Ford is used as the algorithm for dynamic Distance Vector Routing (DVR) protocols, for example the algorithm is statistically distributed in the Routing Information Protocol (RIP), because it includes a number of nodes (routers) within the system, a collection of IP networks typically owned by an Internet Service Provider. One way to measure the performance of network is by measuring attenuation versus distance. The strength of a signal falls off with increasing distance due to attenuation that raises with proportional distances increments. As distance increases many factor can be introduced to the system that affects the signals strength. Attenuation is a term used to explain the drop of the link signal strength that occurs on the connection links over distance and is measured in db. The further you are away from the exchange, the higher your attenuation figure will be resulting in incremental signal loss. There isn't much you can do regarding the path loss due to attenuation. This is because that is largely dependent upon link length, and the amount of copper in/or joints on your line. So the only technique that may be used to minimize communication loss is by choosing the shortest distance to cover the entire route. If the algorithm used has a slower response and takes longer time to stabilize then it will be more affected to incremental in distance resulting in more attenuation. The throughput is a degree of how fast we can actually transmit data through a network. Although, at first look, bandwidth in bits per second and throughput seem the same, but actually they are different. A link may have a bandwidth of B bit per second, but we can only send T bit per second through this link with T always less than B. In general, the bandwidth is a potential dimension of a link. Throughput can be measured as an individual device (such as a router) or a part of the network. Performance management monitors the throughput to make sure that it is not reduced to undesirable levels. Throughput can be represented as the number of bits passing through a point in a second. It is well known that definition from bits to packets and from a point to a network. Throughput can be defined in a network as the number of packets passing through the network during a unit of time. When the load is below the maximum capacity of the network, then the throughput rises proportionally with the load. It is expected that throughput remains constant after the load reaches the maximum capacity. In the paper we fix the number of nodes to 9 then we make the transmitting rate variable [14]. 3. Results and discussion From the designed algorithm of Dijkstra with 9 randomly created nodes the network will be as shown in the next figure. The designed algorithm calculates the distance for the all nodes, it returns the minimum distance and highlighted with red color the shortest route. Reffering to Figure 3, in order to send data from source node 1 to destination node 9 the data will take the shortest route. The shortest path is calculated as d = and the flow of the route goes as follows p = [ ]. On the other hand Bellman Ford has been designed with the same specification as Dijkstra and randomly generated nodes as show in the next figure. The calculated path in Figure 4 gives d = and the nodes flow from source to destination will be p =[ ]. Thus result in shorter route can be found using Dijksra algorithm. The second test is on algorithm performance and based on attenuation versus distance as shown in the next graph. The Dijkestra algorithm in Figure 5 below is highlighted with blue color performs better with distance increments comparing to Bellman Ford that appears with red color. This is due to faster response in the Dijkstra algorithm, which required less convergence time. The next part is the comparison in term of throughput versus traffic loads. 112
5 Figure 3. Dijkstra Shortest distance route Figure 4. Bellman shortest distance route
6 Figure 5. Attenuation versus distance in Dijkstra and Bellman Ford algorithms 10 9 Diji 8 7 Throughput /Mbit/s traffic load/mbit/s Figure 6. Dijkstra throughput versus traffic loads. 114
7 10 9 Bell 8 7 Throughput /Mbit/s traffic load/mbit/s Figure 7. Bellman throughput versus traffic load From figure 6 and 7, the throughput increases proportional to the increase in traffic load. Thus results of the performance test in terms of throughput versus traffic load the Dijkstra algorithm performs slightly well than Bellman algorithm. Based on the result analysis and literature review, evaluation of the relative advantages of the two algorithms should consider two things; the processing time needed and the amount of information that must be gathered from other vertices in the network or Internet. The assessment will be depending on the implementation methodology and the precise implementation. If the network implemented with negative routes the Bellman can be used. On the other hand, if higher response is needed and lower load desirable, then Dijkstra will be better choice. 4. Conclusion There are a lot of proposals of determining a shortest path routing in networks. One of the most widely used methods is the Dijksta algorithm. Usually, if the classical methods are not able to find the shortest route or have some problems, other alternatives can be used. Bellman Ford algorithm can find the shortest route even if the network contains negative cycles. A comparison between the two algorithms has been performed. This paper also shows the discovery of the performance of each algorithm in terms of attenuation versus distance and throughput versus traffic load. Dijkstra performs better in terms of attenuation since it performs faster calculation with lower convergence time. Dijkstra algorithm also proves a lower load generation comparing to Bellman Ford algorithm. 5. Acknowledgment Authors would like to thank Universiti Teknikal Malaysia Melaka for sponsoring this project. This project was funded by university short-term grant PJP/2011/FKEKK(38C)/S Deep appreciations are also dedicated to anyone who directly or indirectly involved in this project. 6. References [1] Liu Xiao-Yan, Chen Yan-Li, Application of Dijkstra Algorithm in Logistics Distribution Lines, In the Proceeding of Third International Symposium on Computer Science and Computational Technology, P. R. China, pp , August [2] Jie Huang, Bei Huang, A Security Routing Protocol Based on Public Key Matrix for Wireless Sensor Networks, Journal of Convergence Information Technology, Vol. 7, No. 3, pp ,
8 [3] Liao Ming-hua, Zhang Hua, Sun Guang, "Energy Aware Routing Algorithm for Wireless Sensor Network Based on Ant Colony Principle", Journal of Convergence Information Technology, Vol. 7, No. 4, pp , [4] Ma Rui, Liu Yan-cheng, Wang Chuan, "An Energy Efficient and Reliable Routing Protocol Using Clustering Hierarchical Structure for Wireless Sensor Networks", International Journal of Digital Content Technology and its Applications, Vol. 7, No. 3, pp , [5] Moshe Sniedovich, Dijkstra s algorithm revisited: the dynamic programming connexion, Control and Cybernatics, Vol. 5, No. 3, pp , [6] R. Bellman, The theory of dynamic programming, Proceedings of the National Academy of Sciences, Vol. 38, No. 4, pp , [7] L. R. Ford and D. R. Fulkerson, Constructing maximal dynamic flows from static flows, Operations Research, Vol. 6, pp , [8] H. JuZoji, I. Nakajima, T. Kitano, A Development of Network Topology of Wireless Packet Communications for Disaster Situation with Genetic Algorithms or with Dijkstra's, In the Proceeding of IEEE 2011 International Conference on Communication, pp. 1-5, [9] Yuanzhe Xu, Zixun Wang, Qingqing Zheng, Zhiyong Han, The Application of Dijkstra's Algorithm in the Intelligent Fire Evacuation System, In the Proceeding of th International Conference on Intelligent Human-Machine Systems and Cybernatics (IHMSC), pp. 3-6, [10] W. A. Kamal, R. Samar, A Mission Planning Approach for UAV applications, In the Proceeding of 47 th International Conference on Decision and Control, pp , [11] R. K. Megalingam, A. P. Rajendran, D. Dileepkumar, LARN: Implementation of automatic navigation in indoor navigation for physically challenged, In the Proceeding of 2012 Annual IEEE India Conference (INDICON), pp , [12] N. Jasika, Dijkstra's shortest path algorithm serial and parallel execution performance analysis, In the Proceedings of the 35th International Convention of MIPRO, pp , [13] Derek O Connor, Notes on Bellman-Ford-Moore Shortest Path Algorithm and its Implementation in MATLAB, University College of Dublin, September [14] M. Baharloo, R. Hajisheykhi, M. Arjomand, A. H. Jahangir, An Analytical Performance Evaluation for WSNs Using Loop-Free Bellman Ford Protocol, In the Proceeding of International Conference on Advanced Information Networking and Applications, pp ,
Bijou Detouring - A Dynamic Node Level Routing Algorithm
Bijou Detouring - A Dynamic Node Level Routing Algorithm G.Reshma K.Swarupa Rani D.Leela Dharani D.Anusha Abstract This paper holds a candle light on the Dijkstra algorithm and Distance Vector routing
More informationNetwork Routing Protocol using Genetic Algorithms
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:0 No:02 40 Network Routing Protocol using Genetic Algorithms Gihan Nagib and Wahied G. Ali Abstract This paper aims to develop a
More informationFINDINGS ON A LEAST HOP (s) PATH USING BELLMAN-FORD ALGORITHM
FINDINGS ON A EAST HOP (s) PATH USING BEMAN-FORD AGORITHM NIK SHAHIDAH AFIFI MD TAUJUDDIN MOHD HEMY ABD WAHAB SITI ZARINA MOHD MUJI ZARINA TUKIRAN FIRST REGIONA CONFERENCE ON COMPUTATIONA SCIENCE AND TECHNOOGIES
More informationIntra-domain Routing
Intra-domain Routing Outline Introduction to Routing Distance Vector Algorithm CS 640 1 Goal Build router forwarding tables in an internetwork using intra-domain routing protocols High level approach Distributed
More informationCS 3410 Ch 14 Graphs and Paths
CS 3410 Ch 14 Graphs and Paths Sections 14.1-14.3 Pages 527-552 Exercises 1,2,5,7-9 14.1 Definitions 1. A vertex (node) and an edge are the basic building blocks of a graph. Two vertices, (, ) may be connected
More informationDesign and Implementation of an Anycast Efficient QoS Routing on OSPFv3
Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3 Han Zhi-nan Yan Wei Zhang Li Wang Yue Computer Network Laboratory Department of Computer Science & Technology, Peking University
More informationShortest Path Algorithm
Shortest Path Algorithm Shivani Sanan* 1, Leena jain 2, Bharti Kappor 3 *1 Assistant Professor, Faculty of Mathematics, Department of Applied Sciences 2 Associate Professor & Head- MCA 3 Assistant Professor,
More informationRouting Algorithms. CS158a Chris Pollett Apr 4, 2007.
Routing Algorithms CS158a Chris Pollett Apr 4, 2007. Outline Routing Algorithms Adaptive/non-adaptive algorithms The Optimality Principle Shortest Path Routing Flooding Distance Vector Routing Routing
More informationRouting. 4. Mar INF-3190: Switching and Routing
Routing 4. Mar. 004 1 INF-3190: Switching and Routing Routing: Foundations! Task! To define the route of packets through the network! From the source! To the destination system! Routing algorithm! Defines
More informationAn Experiment on the Performance of Shortest Path Algorithm
An Experiment on the Performa of Shortest Path Algorithm Simon Chan Yew Meng, Nur ayuni Adnan, Syazwan Syafiqah Sukri, and Wan Mohd Nazmee Wan Zainon Universiti Sains Malaysia, Malaysia {simon.ucom13;
More informationC13b: Routing Problem and Algorithms
CISC 7332X T6 C13b: Routing Problem and Algorithms Hui Chen Department of Computer & Information Science CUNY Brooklyn College 11/20/2018 CUNY Brooklyn College 1 Acknowledgements Some pictures used in
More informationHow Routing Algorithms Work
How Routing Algorithms Work A router is used to manage network traffic and find the best route for sending packets. But have you ever thought about how routers do this? Routers need to have some information
More informationEnergy Aware Node Placement Algorithm for Wireless Sensor Network
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 6 (2014), pp. 541-548 Research India Publications http://www.ripublication.com/aeee.htm Energy Aware Node Placement Algorithm
More informationSingle Source Shortest Path
Single Source Shortest Path A directed graph G = (V, E) and a pair of nodes s, d is given. The edges have a real-valued weight W i. This time we are looking for the weight and the shortest path from s
More informationCOM-208: Computer Networks - Homework 6
COM-208: Computer Networks - Homework 6. (P22) Suppose you are interested in detecting the number of hosts behind a NAT. You observe that the IP layer stamps an identification number sequentially on each
More informationCS 457 Networking and the Internet. What is Routing. Forwarding versus Routing 9/27/16. Fall 2016 Indrajit Ray. A famous quotation from RFC 791
CS 457 Networking and the Internet Fall 2016 Indrajit Ray What is Routing A famous quotation from RFC 791 A name indicates what we seek An address indicates where it is A route indicates how we get there
More informationShortest Path Algorithm For Satellite Network
ISSN: 2278 0211 (Online) Shortest Path Algorithm For Satellite Network Kushagra Srivastava School of Computer Science and Engineering Vellore Institute of Technology, India RavikantTyagi School of Computer
More informationCommunication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1
Communication Networks I December, Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page Communication Networks I December, Notation G = (V,E) denotes a
More information4/8/11. Single-Source Shortest Path. Shortest Paths. Shortest Paths. Chapter 24
/8/11 Single-Source Shortest Path Chapter 1 Shortest Paths Finding the shortest path between two nodes comes up in many applications o Transportation problems o Motion planning o Communication problems
More informationRouting Algorithms. 1 Administrivia. Tom Kelliher, CS 325. Apr. 25, Announcements. Assignment. Read 4.6. From Last Time. IP protocol.
Routing Algorithms Tom Kelliher, CS 325 Apr. 25, 2008 1 Administrivia Announcements Assignment Read 4.6. From Last Time IP protocol. Outline 1. Introduction. 2. Link state routing. 3. Distance vector routing.
More information22 Elementary Graph Algorithms. There are two standard ways to represent a
VI Graph Algorithms Elementary Graph Algorithms Minimum Spanning Trees Single-Source Shortest Paths All-Pairs Shortest Paths 22 Elementary Graph Algorithms There are two standard ways to represent a graph
More informationPerformance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless
More informationA Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang
A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts
More informationM. Yamuna* et al. /International Journal of Pharmacy & Technology
ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com FINDING CRITICAL PATH OF A NETWORK USING MODIFIED DIJKSTRA S ALGORITHM Shantan Sawa, Shivangee Sabharwal, Purushottam
More informationRouting Outline. EECS 122, Lecture 15
Fall & Walrand Lecture 5 Outline EECS, Lecture 5 Kevin Fall kfall@cs.berkeley.edu Jean Walrand wlr@eecs.berkeley.edu Definition/Key Questions Distance Vector Link State Comparison Variations EECS - Fall
More informationShortest path problems
Next... Shortest path problems Single-source shortest paths in weighted graphs Shortest-Path Problems Properties of Shortest Paths, Relaxation Dijkstra s Algorithm Bellman-Ford Algorithm Shortest-Paths
More informationDEVELOPMENT OF AN INTERACTIVE ENVIRONMENT USED FOR SIMULATION OF SHORTEST PATHS ALGORITHMS
1. Anca Elena IORDAN DEVELOPMENT OF AN INTERACTIVE ENVIRONMENT USED FOR SIMULATION OF SHORTEST PATHS ALGORITHMS 1. UNIVERSITY POLITEHNICA OF TIMISOARA, FACULTY OF ENGINEERING HUNEDOARA, ROMANIA ABSTRACT:
More informationCS350: Data Structures Dijkstra s Shortest Path Alg.
Dijkstra s Shortest Path Alg. James Moscola Department of Engineering & Computer Science York College of Pennsylvania James Moscola Shortest Path Algorithms Several different shortest path algorithms exist
More informationArtificial Intelligence
Artificial Intelligence Shortest Path Problem G. Guérard Department of Nouvelles Energies Ecole Supérieur d Ingénieurs Léonard de Vinci Lecture 3 GG A.I. 1/42 Outline 1 The Shortest Path Problem Introduction
More informationLecture 11: Analysis of Algorithms (CS ) 1
Lecture 11: Analysis of Algorithms (CS583-002) 1 Amarda Shehu November 12, 2014 1 Some material adapted from Kevin Wayne s Algorithm Class @ Princeton 1 2 Dynamic Programming Approach Floyd-Warshall Shortest
More informationSubnet Shortest Path Pseudocode based on Dijkstra's Algorithm
Subnet Shortest Path Pseudocode based on Dijkstra's Algorithm Salah Elrofai 1, Abdeen Abdelkareem 2 1Assistant Professor, School of Electronic, Collage of Engineering, Sudan University of Science and Technology,
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 4 Issue 5, Sep - Oct 2016
RESEARCH ARTICLE OPEN ACCESS Investigating the Impact of Simulation Time on Convergence Activity & Duration of EIGRP, OSPF Routing Protocols under Link Failure and Link Recovery in WAN Using OPNET Modeler
More information10/31/18. About A6, Prelim 2. Spanning Trees, greedy algorithms. Facts about trees. Undirected trees
//8 About A, Prelim Spanning Trees, greedy algorithms Lecture CS Fall 8 Prelim : Thursday, November. Visit exams page of course website and read carefully to find out when you take it (: or 7:) and what
More informationSpanning Trees, greedy algorithms. Lecture 20 CS2110 Fall 2018
1 Spanning Trees, greedy algorithms Lecture 20 CS2110 Fall 2018 1 About A6, Prelim 2 Prelim 2: Thursday, 15 November. Visit exams page of course website and read carefully to find out when you take it
More informationA New Distribution Path Selection Method for Biomedical Cold Chain: Bidirectional Dijkstra Algorithm
Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com A New Distribution Path Selection Method for Biomedical Cold Chain: Bidirectional Dijkstra Algorithm Yaoli ZHANG, Guangying XIE, Jing CHEN
More informationComputer Science & Engineering 423/823 Design and Analysis of Algorithms
Computer Science & Engineering 423/823 Design and Analysis of Algorithms Lecture 07 Single-Source Shortest Paths (Chapter 24) Stephen Scott and Vinodchandran N. Variyam sscott@cse.unl.edu 1/36 Introduction
More informationScribe from 2014/2015: Jessica Su, Hieu Pham Date: October 6, 2016 Editor: Jimmy Wu
CS 267 Lecture 3 Shortest paths, graph diameter Scribe from 2014/2015: Jessica Su, Hieu Pham Date: October 6, 2016 Editor: Jimmy Wu Today we will talk about algorithms for finding shortest paths in a graph.
More informationECE 333: Introduction to Communication Networks Fall 2001
ECE : Introduction to Communication Networks Fall 00 Lecture : Routing and Addressing I Introduction to Routing/Addressing Lectures 9- described the main components of point-to-point networks, i.e. multiplexed
More informationGeospatial Information Service Based on Ad Hoc Network
I. J. Communications, Network and System Sciences, 2009, 2, 91-168 Published Online May 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Geospatial Information Service Based on Ad Hoc Network Fuling
More information5.2 Routing Algorithms
CEN445 Network Protocols and Algorithms Chapter 5 Network Layer 5. Routing Algorithms Dr. Mostafa Hassan Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud
More informationCHAPTER 4: ROUTING DYNAMIC. Routing & Switching
CHAPTER 4: ROUTING DYNAMIC Routing & Switching CHAPTER4 4.1 Dynamic Routing Protocols 4.2 Distance Vector Dynamic Routing 4.3 RIP and RIPng Routing 4.4 Link-State Dynamic Routing 4.5 The Routing Table
More informationM. Yamuna* et al. International Journal of Pharmacy & Technology
ISSN: 0975766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com AMULANCE SERVICE USING MODIFIED DIJKSTRA S ALGORITHM Chhandak agchi, Khushbu Chopra, M. Yamuna* VIT University,
More informationEvaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks
Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks Ayad Salhieh Department of Electrical and Computer Engineering Wayne State University Detroit, MI 48202 ai4874@wayne.edu Loren
More informationOptimal Detector Locations for OD Matrix Estimation
Optimal Detector Locations for OD Matrix Estimation Ying Liu 1, Xiaorong Lai, Gang-len Chang 3 Abstract This paper has investigated critical issues associated with Optimal Detector Locations for OD matrix
More informationNodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks
IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI
More informationResearch on Heterogeneous Communication Network for Power Distribution Automation
3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research on Heterogeneous Communication Network for Power Distribution Automation Qiang YU 1,a*, Hui HUANG
More informationModel the P2P Attack in Computer Networks
International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2015) Model the P2P Attack in Computer Networks Wei Wang * Science and Technology on Communication Information
More informationRouting Protocols and the IP Layer
Routing Protocols and the IP Layer CS244A Review Session 2/0/08 Ben Nham Derived from slides by: Paul Tarjan Martin Casado Ari Greenberg Functions of a router Forwarding Determine the correct egress port
More informationDISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK
DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK G.Ratna kumar, Dr.M.Sailaja, Department(E.C.E), JNTU Kakinada,AP, India ratna_kumar43@yahoo.com, sailaja.hece@gmail.com ABSTRACT:
More informationChapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1
Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 22-3 UNICAST ROUTING PROTOCOLS 22.2 A routing
More informationCS644 Advanced Networks
Outline CS644 Advanced Networks Lecture 9 Intra Domain Routing Andreas Terzis Spring 2004 1 So far we have talked about E2E mechanisms Routing is the other big component of the network Largest distributed
More informationNetwork Layer: Routing
Network Layer: Routing The Problem A B R 1 R 2 R 4 R 3 Goal: for each destination, compute next hop 1 Lecture 9 2 Basic Assumptions Trivial solution: Flooding Dynamic environment: links and routers unreliable:
More informationAll Rights Reserved 2017 IJARCET
END-TO-END DELAY WITH MARKOVIAN QUEUING BASED OPTIMUM ROUTE ALLOCATION FOR MANETs S. Sudha, Research Scholar Mrs. V.S.LAVANYA M.Sc(IT)., M.C.A., M.Phil., Assistant Professor, Department of Computer Science,
More informationImplementation of Parallel Path Finding in a Shared Memory Architecture
Implementation of Parallel Path Finding in a Shared Memory Architecture David Cohen and Matthew Dallas Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 12180 Email: {cohend4, dallam}
More informationModule 8. Routing. Version 2 ECE, IIT Kharagpur
Module 8 Routing Lesson 27 Routing II Objective To explain the concept of same popular routing protocols. 8.2.1 Routing Information Protocol (RIP) This protocol is used inside our autonomous system and
More informationCheapest Paths in Multi-Interface Networks A Distributed Approach
Cheapest Paths in Multi-Interface Networks A Distributed Approach Harish Muthuveeran Shanmugam Department of Engineering and Information Sciences Middlesex University, Greater London Greater London, United
More informationAn Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks
An Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks Timothy Hahn, Shen Wan March 5, 2008 Montana State University Computer Science Department Bozeman,
More informationVarying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network
Journal of Computer Science 7 (5): 678-682, 2011 ISSN 1549-3636 2011 Science Publications Varying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network 1 V. Balaji and 2 V. Duraisamy
More informationThe General Analysis of Proactive Protocols DSDV, FSR and WRP
Volume 116 No. 10 2017, 375-380 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu The General Analysis of Proactive Protocols DSDV, FSR and WRP 1 Dr.
More informationA Study of Different Parallel Implementations of Single Source Shortest Path Algorithms
A Study of Different Parallel Implementations of Single Source Shortest Path s Dhirendra Pratap Singh Department of Computer Science and Engineering Maulana Azad National Institute of Technology, Bhopal
More informationYouki Kadobayashi NAIST
Information Network 1 Routing (1) Youki Kadobayashi NAIST 1 The Routing Problem! How do I get from source to destination?! Which path is best? In terms of:! Number of hops! Delay! Bandwidth! Policy constraints!
More informationReinforcement learning algorithms for non-stationary environments. Devika Subramanian Rice University
Reinforcement learning algorithms for non-stationary environments Devika Subramanian Rice University Joint work with Peter Druschel and Johnny Chen of Rice University. Supported by a grant from Southwestern
More informationCLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS M.SASIKUMAR 1 Assistant Professor, Dept. of Applied Mathematics and Computational Sciences, PSG College of Technology, Coimbatore, Tamilnadu,
More informationGraphs. The ultimate data structure. graphs 1
Graphs The ultimate data structure graphs 1 Definition of graph Non-linear data structure consisting of nodes & links between them (like trees in this sense) Unlike trees, graph nodes may be completely
More informationFor example, in the widest-shortest path heuristic [8], a path of maximum bandwidth needs to be constructed from a structure S that contains all short
A Note on Practical Construction of Maximum Bandwidth Paths Navneet Malpani and Jianer Chen Λ Department of Computer Science Texas A&M University College Station, TX 77843-3112 Abstract Constructing maximum
More informationCONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS
CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS 1 JAMES SIMS, 2 NATARAJAN MEGHANATHAN 1 Undergrad Student, Department
More informationCourse Routing Classification Properties Routing Protocols 1/39
Course 8 3. Routing Classification Properties Routing Protocols 1/39 Routing Algorithms Types Static versus dynamic Single-path versus multipath Flat versus hierarchical Host-intelligent versus router-intelligent
More informationShortest Paths. Nishant Mehta Lectures 10 and 11
Shortest Paths Nishant Mehta Lectures 0 and Communication Speeds in a Computer Network Find fastest way to route a data packet between two computers 6 Kbps 4 0 Mbps 6 6 Kbps 6 Kbps Gbps 00 Mbps 8 6 Kbps
More informationUsing The Heuristic Genetic Algorithm in Multi-runway Aircraft Landing Scheduling
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.3, March 2014, pp. 2203 ~ 2211 DOI: http://dx.doi.org/10.11591/telkomnika.v12i3.4488 2203 Using The Heuristic Genetic Algorithm in Multi-runway
More informationOutline. (single-source) shortest path. (all-pairs) shortest path. minimum spanning tree. Dijkstra (Section 4.4) Bellman-Ford (Section 4.
Weighted Graphs 1 Outline (single-source) shortest path Dijkstra (Section 4.4) Bellman-Ford (Section 4.6) (all-pairs) shortest path Floyd-Warshall (Section 6.6) minimum spanning tree Kruskal (Section 5.1.3)
More informationRedes de Computadores. Shortest Paths in Networks
Redes de Computadores Shortest Paths in Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto » What is a graph?» What is a spanning tree?» What is a shortest path tree?» How are
More informationMinimum Cost Edge Disjoint Paths
Minimum Cost Edge Disjoint Paths Theodor Mader 15.4.2008 1 Introduction Finding paths in networks and graphs constitutes an area of theoretical computer science which has been highly researched during
More informationShortest Paths. Nishant Mehta Lectures 10 and 11
Shortest Paths Nishant Mehta Lectures 0 and Finding the Fastest Way to Travel between Two Intersections in Vancouver Granville St and W Hastings St Homer St and W Hastings St 6 Granville St and W Pender
More informationSpanning Trees, greedy algorithms. Lecture 22 CS2110 Fall 2017
1 Spanning Trees, greedy algorithms Lecture 22 CS2110 Fall 2017 1 We demo A8 Your space ship is on earth, and you hear a distress signal from a distance Planet X. Your job: 1. Rescue stage: Fly your ship
More informationUNIT 2 ROUTING ALGORITHMS
UNIT ROUTING ALGORITHMS Routing Algorithms Structure Page Nos..0 Introduction 3. Objectives 3. Flooding 3.3 Shortest Path Routing Algorithm 5.4 Distance Vector Routing 6.4. Comparison.4. The Count-to-Infinity
More informationGraphs. The ultimate data structure. graphs 1
Graphs The ultimate data structure graphs 1 Definition of graph Non-linear data structure consisting of nodes & links between them (like trees in this sense) Unlike trees, graph nodes may be completely
More informationPerformance Measurement of Dijkstra using WSN: A Review
Performance Measurement of Dijkstra using WSN: A Review Anu Dahiya 1 and Vinit Kumar 2 1 M.Tech. Scholar, CSE Department, VCE, Rohtak, Haryana (India) anudahiya003.ad@gmail.com 2 Assistant Professor, CSE
More informationIn this edition of HowStuffWorks, we'll find out precisely what information is used by routers in determining where to send a packet.
How Routing Algorithms Work by Roozbeh Razavi If you have read the HowStuffWorks article How Routers Work, then you know that a router is used to manage network traffic and find the best route for sending
More informationA Review: Optimization of Energy in Wireless Sensor Networks
A Review: Optimization of Energy in Wireless Sensor Networks Anjali 1, Navpreet Kaur 2 1 Department of Electronics & Communication, M.Tech Scholar, Lovely Professional University, Punjab, India 2Department
More informationRouting, Routing Algorithms & Protocols
Routing, Routing Algorithms & Protocols Computer Networks Lecture 6 http://goo.gl/pze5o8 Circuit-Switched and Packet-Switched WANs 2 Circuit-Switched Networks Older (evolved from telephone networks), a
More informationRouting Algorithms. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Routing Algorithms Daniel Zappala CS 460 Computer Networking Brigham Young University Routing 2/20 How does the Internet determine which path to use from the source to the destination? Challenges need
More informationThe Gene Modular Detection of Random Boolean Networks by Dynamic Characteristics Analysis
Journal of Materials, Processing and Design (2017) Vol. 1, Number 1 Clausius Scientific Press, Canada The Gene Modular Detection of Random Boolean Networks by Dynamic Characteristics Analysis Xueyi Bai1,a,
More informationInternational Journal of Computer Engineering and Applications, Volume XII, Special Issue, July 18, ISSN
International Journal of Computer Engineering and Applications, Volume XII, Special Issue, July 18, www.ijcea.com ISSN 2321-3469 MULTICAST ROUTING: CONVENTIONAL ALGORITHMS VS ANT COLONY SYSTEM ABSTRACT
More informationRegression Based Cluster Formation for Enhancement of Lifetime of WSN
Regression Based Cluster Formation for Enhancement of Lifetime of WSN K. Lakshmi Joshitha Assistant Professor Sri Sai Ram Engineering College Chennai, India lakshmijoshitha@yahoo.com A. Gangasri PG Scholar
More informationComputer Networking. Intra-Domain Routing. RIP (Routing Information Protocol) & OSPF (Open Shortest Path First)
Computer Networking Intra-Domain Routing RIP (Routing Information Protocol) & OSPF (Open Shortest Path First) IP Forwarding The Story So Far IP addresses are structured to reflect Internet structure IP
More informationThe Impact of Clustering on the Average Path Length in Wireless Sensor Networks
The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia
More informationGraphs. Part II: SP and MST. Laura Toma Algorithms (csci2200), Bowdoin College
Laura Toma Algorithms (csci2200), Bowdoin College Topics Weighted graphs each edge (u, v) has a weight denoted w(u, v) or w uv stored in the adjacency list or adjacency matrix The weight of a path p =
More informationDynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks
Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks Guangyan Huang 1, Xiaowei Li 1, and Jing He 1 Advanced Test Technology Lab., Institute of Computing Technology, Chinese
More informationA priority based dynamic bandwidth scheduling in SDN networks 1
Acta Technica 62 No. 2A/2017, 445 454 c 2017 Institute of Thermomechanics CAS, v.v.i. A priority based dynamic bandwidth scheduling in SDN networks 1 Zun Wang 2 Abstract. In order to solve the problems
More informationAN OPTIMIZATION GENETIC ALGORITHM FOR IMAGE DATABASES IN AGRICULTURE
AN OPTIMIZATION GENETIC ALGORITHM FOR IMAGE DATABASES IN AGRICULTURE Changwu Zhu 1, Guanxiang Yan 2, Zhi Liu 3, Li Gao 1,* 1 Department of Computer Science, Hua Zhong Normal University, Wuhan 430079, China
More information1 More on the Bellman-Ford Algorithm
CS161 Lecture 12 Shortest Path and Dynamic Programming Algorithms Scribe by: Eric Huang (2015), Anthony Kim (2016), M. Wootters (2017) Date: May 15, 2017 1 More on the Bellman-Ford Algorithm We didn t
More informationFigure 1. Clustering in MANET.
Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance
More informationThe Load Balancing Research of SDN based on Ant Colony Algorithm with Job Classification Wucai Lin1,a, Lichen Zhang2,b
2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA 2016) The Load Balancing Research of SDN based on Ant Colony Algorithm with Job Classification Wucai Lin1,a, Lichen Zhang2,b
More informationYouki Kadobayashi NAIST
Information Network 1 Routing (1) Image: Part of the entire Internet topology based on CAIDA dataset, using NAIST Internet viewer Youki Kadobayashi NAIST 1 The Routing Problem! How do I get from source
More informationA Path Planning Method for Substation Laser Inspection Robot Based on Improved Ant Colony Algorithm
2nd International Conference on Computer Engineering, Information Science & Application Techlogy (ICCIA 2017) A Path Planning Method for Substation Laser Inspection Robot Based on Improved Ant Colony Algorithm
More informationPerformance Analysis of Storage-Based Routing for Circuit-Switched Networks [1]
Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Presenter: Yongcheng (Jeremy) Li PhD student, School of Electronic and Information Engineering, Soochow University, China
More informationConstrained Minimum Spanning Tree Algorithms
December 8, 008 Introduction Graphs and MSTs revisited Minimum Spanning Tree Algorithms Algorithm of Kruskal Algorithm of Prim Constrained Minimum Spanning Trees Bounded Diameter Minimum Spanning Trees
More informationOptimization of Ant based Cluster Head Election Algorithm in Wireless Sensor Networks
Optimization of Ant based Cluster Head Election Algorithm in Wireless Sensor Networks Siddharth Kumar M.Tech Student, Dept of Computer Science and Technology, Central University of Punjab, Punjab, India
More informationDHANALAKSHMI COLLEGE OF ENGINEERING, CHENNAI. Department of Computer Science and Engineering CS6301 PROGRAMMING DATA STRUCTURES II
DHANALAKSHMI COLLEGE OF ENGINEERING, CHENNAI Department of Computer Science and Engineering CS6301 PROGRAMMING DATA STRUCTURES II Anna University 2 & 16 Mark Questions & Answers Year / Semester: II / III
More informationEDCA LIMITATION WITH HIGH TRAFFIC REAL TIME APPLICATIONS
EDCA LIMITATION WITH HIGH TRAFFIC REAL TIME APPLICATIONS 1 AHMED ABU-KHADRAH, 2 ZAHRILADHA ZAKARIA, 3 MOHDAZLISHAH OTHMAN 1,2,3 Centre for Telecommunication Research and Innovation (CeTRI), Faculty of
More information