An Analysis of Least-Cost Routing using Bellman Ford and Dijkstra Algorithms in Wireless Routing Network

Size: px
Start display at page:

Download "An Analysis of Least-Cost Routing using Bellman Ford and Dijkstra Algorithms in Wireless Routing Network"

Transcription

1 An Analysis of Least-Cost Routing using Bellman Ford and Dijkstra Algorithms in Wireless Routing Network Centre for Telecommunication Research and Innovation (CeTRI), Faculty of Electronic and Computer Engineering, Universiti Teknikal Malaysia Melaka, Durian Tunggal, Melaka, Malaysia Abstract In this paper, two different shortest paths routing algorithms in respect of performance are discussed. The first one is Dijkstra algorithm in routing network. The second one is a method that can be used in negative cycles known as Bellman Ford Algorithm. The paper is about a network creation with 9 nodes routes using MATLAB environment. Both algorithms have been applied and their performances are compared in terms of attenuation versus distance and throughput versus traffic load, a fully comparison table has been created and discussed. Keywords: Djikstra algorithm, Bellman-Ford algorithm, performance, attenuation 1. Introduction The evolution of networking and computer information technology caused a wide attention on research about graphical theory was reported in the last few years. Besides, a variety of graphical structures and algorithms have been projected in many fields of science too. Nowadays, the shortest path algorithm has become one of the most hotspot researches in graph theory and its algorithms. In addition, shortest path algorithm is used to control traffic engineering in Internet Protocol networks and to enhance networking and communications systems [1]. A lot of protocols have been tested in the wireless sensor networks such as Public Key Matrix [2], Ant Colony Principle [3], Clustering Hierarchical Structure [4] and many others. Dijkstra's and Bellman-Ford are the most popular algorithms in computer science and networking. They are also widely used in operations research. They have many attractions for both computer architectures and networks. Unfortunately, a number of important features of these interesting algorithms are not as clear to the normal users as they should be. Specifically, one of the results of the history of the algorithm is that they are generally regarded as a computer science method rather than as an operation research method. One of the main reasons for the acceptance of Dijkstra's and Bellman Algorithms is that they are the most important and useful algorithms existing for producing (precise) optimum solutions to most classes of shortest path problems. The point being that these classes of problems are very important in theoretical and educational purposes [5]. Dijkstra s algorithm is the route algorithm prepared by the Dutch computer scientist Edsger Dijkstra in 1956 and published in It is a graph search algorithm that explains the singlesource shortest route problem for a graph with nonnegative valued edge route costs. Therefore, it produces the shortest path tree. This system is widely used in routing and also as a subroutine in other graph algorithms. The disadvantage of the algorithm is that it cannot handle maps with negative path weights. The Bellman-Ford algorithm computes single-source shortest paths in a weighted graph or digraph, where some of the edge weights may be negative. This algorithm is a modification of the one published in 1952 by Richard E. Bellman [6] and that by Lester Randolph Ford [7]. Many applications can be used using these algorithms such as routing in wireless network for disaster situation [8], intelligent fire evacuation system [9], defense system International Journal of Advancements in Computing Technology(IJACT) Volume 5, Number 10, June 2013 doi : /ijact.vol5.issue

2 for mission planning approach using UAV [10], and also in automatic indoor navigation system [11]. 2. Djikstra and Bellman-Ford Algorithm Theory For a specified source vertex (node), the algorithm calculates all paths and finds out the path with lowest cost (i.e. the shortest distance) between that node and every other node in the network. It can also be used in calculating costs of shortest paths from a single node source to a single destination node by discontinuing the algorithm once the shortest path to the destination node has been reached. For example, if the node of the graph represents hosts and edge path costs represent path distances between pairs of nodes connected by a direct link, Dijkstra s algorithm can be used to find the minimum cost or shortest link path between one host and all other hosts in the network. Moreover, Dijkstra algorithm was highly motivated by Bellman's Principle of Optimality and that both theoretically and optimality related to the mathematical optimization method known as dynamic programming. One of the immediate implications of this perspective is that this widely used algorithm can be combined in the dynamic programming. The Bellman Ford algorithm sometimes denoted to as the Label Correcting Algorithm LCA, computes single-source shortest paths in a weighted routes (where some of the links weights may be negative). On the other hand and unlike Dijkstra, Bellman-Ford algorithm does not choose optimal set of nodes to scan: it simply iterates at all routes that may face in any directions. For each node, the algorithm may set as a "predecessor". At the end of the calculated route, the path from the distention to the source point can be traced by tracking the node, which was named as a predecessor in the path. Bellman-Ford algorithm goes over edges, not over nodes (vertices) of the graph, and gives all edges a directional value (thus route from node A to B can have different values comparing to the route from node B to A). A couple of reversed edges must be counted for every connection if the node relations in the task are not directional. The purpose of both algorithms describes the way to find the nodes shortest path problem. The primary difference in these algorithms is the fact that Dijkstra carries the overall information of the network in every node. On the other hand, Bellman-Ford algorithm doesn t care about the overall network costs where each node needs to know the cost or distances with immediately neighbor nodes. Another difference is when a negative cost is available in the routes. In such case the Dijkstra algorithm cannot be useful. However, if native values are in the network, the Bellman-Ford method can handle the process to calculate the minimum route [12] Djikstra s Algorithm Dijkstra's algorithm finds the shortest path length between two nodes in a graph. The algorithm works as follows; select the source node to be initial point. Then set the outline a set S of nodes, and set it to empty points. As the algorithm progresses, the set S will save those nodes to which a shortest path has been found. Later on, label the source node with 0, and add it into S. Next step we need to consider each node not in S connected by a route from the newly inserted node. Label the node not in S with the label of the newly inserted node and store the length of the route. But if the node not in S was already labeled, its new label will be min (label of newly inserted node + length of route, old label). Then pick a vertex not in S with the lowest label, and add it to S. Repeat the previous step, until the destination node is in S or there are no labeled nodes not in S. If the target is labeled; its label will be the path link distance from source to destination. If it is not labeled, there is no path. An upper bound of the running time of Dijkstra and Bellman algorithm on a graph with routes M and nodes N can be expressed as a function of M and N using the Big-O notation. Bellman complexity can be represented as O (mn), and Dijkstra O (n 2 ). 110

3 Figure 1. Dijkstra s algorithm [12] The instruction is theoretically as follows: to begin, mark the distance or cost to every intersection on the map with infinity. Even it is not infinity distance but to start the assumption and to note that node has not yet been visited; some alternatives of this technique simply leave the intersection unmarked. For the first iteration the current node will be the starting point and the distance to it will be labeled as zero. For the following iterations (after the first), the current intersection will be the closest unvisited node to the starting point. From the current point, update the distance to every unvisited node that is immediately neighbor to the first node or directly connected to it. This is ended by determining the sum of the distance between an unvisited intersection and the value of the current intersection, and relabeling the unvisited nodes with this value if it is less than its current value [12] Bellman-Ford Algorithm Bellman-Ford algorithm describes the shortest path in the general case in which routes of a certain network can have negative weight as long as the loop contains no negative cycles. For example it uses d[u] as an upper bound on the distance d [u,v] from u to v. The algorithm progressively reduces an estimate d[v] on the cost of the shortest path from the source node u to each node v in V until it reach the actual shortest-path. The algorithm yields Boolean True if the given digraph contains no negative cycles that are reachable from source node s otherwise it returns Boolean FALSE. Figure 2. Bellman Ford algorithm [13] 111

4 The algorithm is related to Dijkstra algorithm and very similar to, where the only difference is that when working with negative costs since it can t work with a greedy algorithm. A distributed variant of the Bellman Ford is used as the algorithm for dynamic Distance Vector Routing (DVR) protocols, for example the algorithm is statistically distributed in the Routing Information Protocol (RIP), because it includes a number of nodes (routers) within the system, a collection of IP networks typically owned by an Internet Service Provider. One way to measure the performance of network is by measuring attenuation versus distance. The strength of a signal falls off with increasing distance due to attenuation that raises with proportional distances increments. As distance increases many factor can be introduced to the system that affects the signals strength. Attenuation is a term used to explain the drop of the link signal strength that occurs on the connection links over distance and is measured in db. The further you are away from the exchange, the higher your attenuation figure will be resulting in incremental signal loss. There isn't much you can do regarding the path loss due to attenuation. This is because that is largely dependent upon link length, and the amount of copper in/or joints on your line. So the only technique that may be used to minimize communication loss is by choosing the shortest distance to cover the entire route. If the algorithm used has a slower response and takes longer time to stabilize then it will be more affected to incremental in distance resulting in more attenuation. The throughput is a degree of how fast we can actually transmit data through a network. Although, at first look, bandwidth in bits per second and throughput seem the same, but actually they are different. A link may have a bandwidth of B bit per second, but we can only send T bit per second through this link with T always less than B. In general, the bandwidth is a potential dimension of a link. Throughput can be measured as an individual device (such as a router) or a part of the network. Performance management monitors the throughput to make sure that it is not reduced to undesirable levels. Throughput can be represented as the number of bits passing through a point in a second. It is well known that definition from bits to packets and from a point to a network. Throughput can be defined in a network as the number of packets passing through the network during a unit of time. When the load is below the maximum capacity of the network, then the throughput rises proportionally with the load. It is expected that throughput remains constant after the load reaches the maximum capacity. In the paper we fix the number of nodes to 9 then we make the transmitting rate variable [14]. 3. Results and discussion From the designed algorithm of Dijkstra with 9 randomly created nodes the network will be as shown in the next figure. The designed algorithm calculates the distance for the all nodes, it returns the minimum distance and highlighted with red color the shortest route. Reffering to Figure 3, in order to send data from source node 1 to destination node 9 the data will take the shortest route. The shortest path is calculated as d = and the flow of the route goes as follows p = [ ]. On the other hand Bellman Ford has been designed with the same specification as Dijkstra and randomly generated nodes as show in the next figure. The calculated path in Figure 4 gives d = and the nodes flow from source to destination will be p =[ ]. Thus result in shorter route can be found using Dijksra algorithm. The second test is on algorithm performance and based on attenuation versus distance as shown in the next graph. The Dijkestra algorithm in Figure 5 below is highlighted with blue color performs better with distance increments comparing to Bellman Ford that appears with red color. This is due to faster response in the Dijkstra algorithm, which required less convergence time. The next part is the comparison in term of throughput versus traffic loads. 112

5 Figure 3. Dijkstra Shortest distance route Figure 4. Bellman shortest distance route

6 Figure 5. Attenuation versus distance in Dijkstra and Bellman Ford algorithms 10 9 Diji 8 7 Throughput /Mbit/s traffic load/mbit/s Figure 6. Dijkstra throughput versus traffic loads. 114

7 10 9 Bell 8 7 Throughput /Mbit/s traffic load/mbit/s Figure 7. Bellman throughput versus traffic load From figure 6 and 7, the throughput increases proportional to the increase in traffic load. Thus results of the performance test in terms of throughput versus traffic load the Dijkstra algorithm performs slightly well than Bellman algorithm. Based on the result analysis and literature review, evaluation of the relative advantages of the two algorithms should consider two things; the processing time needed and the amount of information that must be gathered from other vertices in the network or Internet. The assessment will be depending on the implementation methodology and the precise implementation. If the network implemented with negative routes the Bellman can be used. On the other hand, if higher response is needed and lower load desirable, then Dijkstra will be better choice. 4. Conclusion There are a lot of proposals of determining a shortest path routing in networks. One of the most widely used methods is the Dijksta algorithm. Usually, if the classical methods are not able to find the shortest route or have some problems, other alternatives can be used. Bellman Ford algorithm can find the shortest route even if the network contains negative cycles. A comparison between the two algorithms has been performed. This paper also shows the discovery of the performance of each algorithm in terms of attenuation versus distance and throughput versus traffic load. Dijkstra performs better in terms of attenuation since it performs faster calculation with lower convergence time. Dijkstra algorithm also proves a lower load generation comparing to Bellman Ford algorithm. 5. Acknowledgment Authors would like to thank Universiti Teknikal Malaysia Melaka for sponsoring this project. This project was funded by university short-term grant PJP/2011/FKEKK(38C)/S Deep appreciations are also dedicated to anyone who directly or indirectly involved in this project. 6. References [1] Liu Xiao-Yan, Chen Yan-Li, Application of Dijkstra Algorithm in Logistics Distribution Lines, In the Proceeding of Third International Symposium on Computer Science and Computational Technology, P. R. China, pp , August [2] Jie Huang, Bei Huang, A Security Routing Protocol Based on Public Key Matrix for Wireless Sensor Networks, Journal of Convergence Information Technology, Vol. 7, No. 3, pp ,

8 [3] Liao Ming-hua, Zhang Hua, Sun Guang, "Energy Aware Routing Algorithm for Wireless Sensor Network Based on Ant Colony Principle", Journal of Convergence Information Technology, Vol. 7, No. 4, pp , [4] Ma Rui, Liu Yan-cheng, Wang Chuan, "An Energy Efficient and Reliable Routing Protocol Using Clustering Hierarchical Structure for Wireless Sensor Networks", International Journal of Digital Content Technology and its Applications, Vol. 7, No. 3, pp , [5] Moshe Sniedovich, Dijkstra s algorithm revisited: the dynamic programming connexion, Control and Cybernatics, Vol. 5, No. 3, pp , [6] R. Bellman, The theory of dynamic programming, Proceedings of the National Academy of Sciences, Vol. 38, No. 4, pp , [7] L. R. Ford and D. R. Fulkerson, Constructing maximal dynamic flows from static flows, Operations Research, Vol. 6, pp , [8] H. JuZoji, I. Nakajima, T. Kitano, A Development of Network Topology of Wireless Packet Communications for Disaster Situation with Genetic Algorithms or with Dijkstra's, In the Proceeding of IEEE 2011 International Conference on Communication, pp. 1-5, [9] Yuanzhe Xu, Zixun Wang, Qingqing Zheng, Zhiyong Han, The Application of Dijkstra's Algorithm in the Intelligent Fire Evacuation System, In the Proceeding of th International Conference on Intelligent Human-Machine Systems and Cybernatics (IHMSC), pp. 3-6, [10] W. A. Kamal, R. Samar, A Mission Planning Approach for UAV applications, In the Proceeding of 47 th International Conference on Decision and Control, pp , [11] R. K. Megalingam, A. P. Rajendran, D. Dileepkumar, LARN: Implementation of automatic navigation in indoor navigation for physically challenged, In the Proceeding of 2012 Annual IEEE India Conference (INDICON), pp , [12] N. Jasika, Dijkstra's shortest path algorithm serial and parallel execution performance analysis, In the Proceedings of the 35th International Convention of MIPRO, pp , [13] Derek O Connor, Notes on Bellman-Ford-Moore Shortest Path Algorithm and its Implementation in MATLAB, University College of Dublin, September [14] M. Baharloo, R. Hajisheykhi, M. Arjomand, A. H. Jahangir, An Analytical Performance Evaluation for WSNs Using Loop-Free Bellman Ford Protocol, In the Proceeding of International Conference on Advanced Information Networking and Applications, pp ,

Bijou Detouring - A Dynamic Node Level Routing Algorithm

Bijou Detouring - A Dynamic Node Level Routing Algorithm Bijou Detouring - A Dynamic Node Level Routing Algorithm G.Reshma K.Swarupa Rani D.Leela Dharani D.Anusha Abstract This paper holds a candle light on the Dijkstra algorithm and Distance Vector routing

More information

Network Routing Protocol using Genetic Algorithms

Network Routing Protocol using Genetic Algorithms International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:0 No:02 40 Network Routing Protocol using Genetic Algorithms Gihan Nagib and Wahied G. Ali Abstract This paper aims to develop a

More information

FINDINGS ON A LEAST HOP (s) PATH USING BELLMAN-FORD ALGORITHM

FINDINGS ON A LEAST HOP (s) PATH USING BELLMAN-FORD ALGORITHM FINDINGS ON A EAST HOP (s) PATH USING BEMAN-FORD AGORITHM NIK SHAHIDAH AFIFI MD TAUJUDDIN MOHD HEMY ABD WAHAB SITI ZARINA MOHD MUJI ZARINA TUKIRAN FIRST REGIONA CONFERENCE ON COMPUTATIONA SCIENCE AND TECHNOOGIES

More information

Intra-domain Routing

Intra-domain Routing Intra-domain Routing Outline Introduction to Routing Distance Vector Algorithm CS 640 1 Goal Build router forwarding tables in an internetwork using intra-domain routing protocols High level approach Distributed

More information

CS 3410 Ch 14 Graphs and Paths

CS 3410 Ch 14 Graphs and Paths CS 3410 Ch 14 Graphs and Paths Sections 14.1-14.3 Pages 527-552 Exercises 1,2,5,7-9 14.1 Definitions 1. A vertex (node) and an edge are the basic building blocks of a graph. Two vertices, (, ) may be connected

More information

Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3

Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3 Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3 Han Zhi-nan Yan Wei Zhang Li Wang Yue Computer Network Laboratory Department of Computer Science & Technology, Peking University

More information

Shortest Path Algorithm

Shortest Path Algorithm Shortest Path Algorithm Shivani Sanan* 1, Leena jain 2, Bharti Kappor 3 *1 Assistant Professor, Faculty of Mathematics, Department of Applied Sciences 2 Associate Professor & Head- MCA 3 Assistant Professor,

More information

Routing Algorithms. CS158a Chris Pollett Apr 4, 2007.

Routing Algorithms. CS158a Chris Pollett Apr 4, 2007. Routing Algorithms CS158a Chris Pollett Apr 4, 2007. Outline Routing Algorithms Adaptive/non-adaptive algorithms The Optimality Principle Shortest Path Routing Flooding Distance Vector Routing Routing

More information

Routing. 4. Mar INF-3190: Switching and Routing

Routing. 4. Mar INF-3190: Switching and Routing Routing 4. Mar. 004 1 INF-3190: Switching and Routing Routing: Foundations! Task! To define the route of packets through the network! From the source! To the destination system! Routing algorithm! Defines

More information

An Experiment on the Performance of Shortest Path Algorithm

An Experiment on the Performance of Shortest Path Algorithm An Experiment on the Performa of Shortest Path Algorithm Simon Chan Yew Meng, Nur ayuni Adnan, Syazwan Syafiqah Sukri, and Wan Mohd Nazmee Wan Zainon Universiti Sains Malaysia, Malaysia {simon.ucom13;

More information

C13b: Routing Problem and Algorithms

C13b: Routing Problem and Algorithms CISC 7332X T6 C13b: Routing Problem and Algorithms Hui Chen Department of Computer & Information Science CUNY Brooklyn College 11/20/2018 CUNY Brooklyn College 1 Acknowledgements Some pictures used in

More information

How Routing Algorithms Work

How Routing Algorithms Work How Routing Algorithms Work A router is used to manage network traffic and find the best route for sending packets. But have you ever thought about how routers do this? Routers need to have some information

More information

Energy Aware Node Placement Algorithm for Wireless Sensor Network

Energy Aware Node Placement Algorithm for Wireless Sensor Network Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 6 (2014), pp. 541-548 Research India Publications http://www.ripublication.com/aeee.htm Energy Aware Node Placement Algorithm

More information

Single Source Shortest Path

Single Source Shortest Path Single Source Shortest Path A directed graph G = (V, E) and a pair of nodes s, d is given. The edges have a real-valued weight W i. This time we are looking for the weight and the shortest path from s

More information

COM-208: Computer Networks - Homework 6

COM-208: Computer Networks - Homework 6 COM-208: Computer Networks - Homework 6. (P22) Suppose you are interested in detecting the number of hosts behind a NAT. You observe that the IP layer stamps an identification number sequentially on each

More information

CS 457 Networking and the Internet. What is Routing. Forwarding versus Routing 9/27/16. Fall 2016 Indrajit Ray. A famous quotation from RFC 791

CS 457 Networking and the Internet. What is Routing. Forwarding versus Routing 9/27/16. Fall 2016 Indrajit Ray. A famous quotation from RFC 791 CS 457 Networking and the Internet Fall 2016 Indrajit Ray What is Routing A famous quotation from RFC 791 A name indicates what we seek An address indicates where it is A route indicates how we get there

More information

Shortest Path Algorithm For Satellite Network

Shortest Path Algorithm For Satellite Network ISSN: 2278 0211 (Online) Shortest Path Algorithm For Satellite Network Kushagra Srivastava School of Computer Science and Engineering Vellore Institute of Technology, India RavikantTyagi School of Computer

More information

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1 Communication Networks I December, Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page Communication Networks I December, Notation G = (V,E) denotes a

More information

4/8/11. Single-Source Shortest Path. Shortest Paths. Shortest Paths. Chapter 24

4/8/11. Single-Source Shortest Path. Shortest Paths. Shortest Paths. Chapter 24 /8/11 Single-Source Shortest Path Chapter 1 Shortest Paths Finding the shortest path between two nodes comes up in many applications o Transportation problems o Motion planning o Communication problems

More information

Routing Algorithms. 1 Administrivia. Tom Kelliher, CS 325. Apr. 25, Announcements. Assignment. Read 4.6. From Last Time. IP protocol.

Routing Algorithms. 1 Administrivia. Tom Kelliher, CS 325. Apr. 25, Announcements. Assignment. Read 4.6. From Last Time. IP protocol. Routing Algorithms Tom Kelliher, CS 325 Apr. 25, 2008 1 Administrivia Announcements Assignment Read 4.6. From Last Time IP protocol. Outline 1. Introduction. 2. Link state routing. 3. Distance vector routing.

More information

22 Elementary Graph Algorithms. There are two standard ways to represent a

22 Elementary Graph Algorithms. There are two standard ways to represent a VI Graph Algorithms Elementary Graph Algorithms Minimum Spanning Trees Single-Source Shortest Paths All-Pairs Shortest Paths 22 Elementary Graph Algorithms There are two standard ways to represent a graph

More information

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless

More information

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts

More information

M. Yamuna* et al. /International Journal of Pharmacy & Technology

M. Yamuna* et al. /International Journal of Pharmacy & Technology ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com FINDING CRITICAL PATH OF A NETWORK USING MODIFIED DIJKSTRA S ALGORITHM Shantan Sawa, Shivangee Sabharwal, Purushottam

More information

Routing Outline. EECS 122, Lecture 15

Routing Outline. EECS 122, Lecture 15 Fall & Walrand Lecture 5 Outline EECS, Lecture 5 Kevin Fall kfall@cs.berkeley.edu Jean Walrand wlr@eecs.berkeley.edu Definition/Key Questions Distance Vector Link State Comparison Variations EECS - Fall

More information

Shortest path problems

Shortest path problems Next... Shortest path problems Single-source shortest paths in weighted graphs Shortest-Path Problems Properties of Shortest Paths, Relaxation Dijkstra s Algorithm Bellman-Ford Algorithm Shortest-Paths

More information

DEVELOPMENT OF AN INTERACTIVE ENVIRONMENT USED FOR SIMULATION OF SHORTEST PATHS ALGORITHMS

DEVELOPMENT OF AN INTERACTIVE ENVIRONMENT USED FOR SIMULATION OF SHORTEST PATHS ALGORITHMS 1. Anca Elena IORDAN DEVELOPMENT OF AN INTERACTIVE ENVIRONMENT USED FOR SIMULATION OF SHORTEST PATHS ALGORITHMS 1. UNIVERSITY POLITEHNICA OF TIMISOARA, FACULTY OF ENGINEERING HUNEDOARA, ROMANIA ABSTRACT:

More information

CS350: Data Structures Dijkstra s Shortest Path Alg.

CS350: Data Structures Dijkstra s Shortest Path Alg. Dijkstra s Shortest Path Alg. James Moscola Department of Engineering & Computer Science York College of Pennsylvania James Moscola Shortest Path Algorithms Several different shortest path algorithms exist

More information

Artificial Intelligence

Artificial Intelligence Artificial Intelligence Shortest Path Problem G. Guérard Department of Nouvelles Energies Ecole Supérieur d Ingénieurs Léonard de Vinci Lecture 3 GG A.I. 1/42 Outline 1 The Shortest Path Problem Introduction

More information

Lecture 11: Analysis of Algorithms (CS ) 1

Lecture 11: Analysis of Algorithms (CS ) 1 Lecture 11: Analysis of Algorithms (CS583-002) 1 Amarda Shehu November 12, 2014 1 Some material adapted from Kevin Wayne s Algorithm Class @ Princeton 1 2 Dynamic Programming Approach Floyd-Warshall Shortest

More information

Subnet Shortest Path Pseudocode based on Dijkstra's Algorithm

Subnet Shortest Path Pseudocode based on Dijkstra's Algorithm Subnet Shortest Path Pseudocode based on Dijkstra's Algorithm Salah Elrofai 1, Abdeen Abdelkareem 2 1Assistant Professor, School of Electronic, Collage of Engineering, Sudan University of Science and Technology,

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 4 Issue 5, Sep - Oct 2016

International Journal of Computer Science Trends and Technology (IJCST) Volume 4 Issue 5, Sep - Oct 2016 RESEARCH ARTICLE OPEN ACCESS Investigating the Impact of Simulation Time on Convergence Activity & Duration of EIGRP, OSPF Routing Protocols under Link Failure and Link Recovery in WAN Using OPNET Modeler

More information

10/31/18. About A6, Prelim 2. Spanning Trees, greedy algorithms. Facts about trees. Undirected trees

10/31/18. About A6, Prelim 2. Spanning Trees, greedy algorithms. Facts about trees. Undirected trees //8 About A, Prelim Spanning Trees, greedy algorithms Lecture CS Fall 8 Prelim : Thursday, November. Visit exams page of course website and read carefully to find out when you take it (: or 7:) and what

More information

Spanning Trees, greedy algorithms. Lecture 20 CS2110 Fall 2018

Spanning Trees, greedy algorithms. Lecture 20 CS2110 Fall 2018 1 Spanning Trees, greedy algorithms Lecture 20 CS2110 Fall 2018 1 About A6, Prelim 2 Prelim 2: Thursday, 15 November. Visit exams page of course website and read carefully to find out when you take it

More information

A New Distribution Path Selection Method for Biomedical Cold Chain: Bidirectional Dijkstra Algorithm

A New Distribution Path Selection Method for Biomedical Cold Chain: Bidirectional Dijkstra Algorithm Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com A New Distribution Path Selection Method for Biomedical Cold Chain: Bidirectional Dijkstra Algorithm Yaoli ZHANG, Guangying XIE, Jing CHEN

More information

Computer Science & Engineering 423/823 Design and Analysis of Algorithms

Computer Science & Engineering 423/823 Design and Analysis of Algorithms Computer Science & Engineering 423/823 Design and Analysis of Algorithms Lecture 07 Single-Source Shortest Paths (Chapter 24) Stephen Scott and Vinodchandran N. Variyam sscott@cse.unl.edu 1/36 Introduction

More information

Scribe from 2014/2015: Jessica Su, Hieu Pham Date: October 6, 2016 Editor: Jimmy Wu

Scribe from 2014/2015: Jessica Su, Hieu Pham Date: October 6, 2016 Editor: Jimmy Wu CS 267 Lecture 3 Shortest paths, graph diameter Scribe from 2014/2015: Jessica Su, Hieu Pham Date: October 6, 2016 Editor: Jimmy Wu Today we will talk about algorithms for finding shortest paths in a graph.

More information

ECE 333: Introduction to Communication Networks Fall 2001

ECE 333: Introduction to Communication Networks Fall 2001 ECE : Introduction to Communication Networks Fall 00 Lecture : Routing and Addressing I Introduction to Routing/Addressing Lectures 9- described the main components of point-to-point networks, i.e. multiplexed

More information

Geospatial Information Service Based on Ad Hoc Network

Geospatial Information Service Based on Ad Hoc Network I. J. Communications, Network and System Sciences, 2009, 2, 91-168 Published Online May 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Geospatial Information Service Based on Ad Hoc Network Fuling

More information

5.2 Routing Algorithms

5.2 Routing Algorithms CEN445 Network Protocols and Algorithms Chapter 5 Network Layer 5. Routing Algorithms Dr. Mostafa Hassan Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud

More information

CHAPTER 4: ROUTING DYNAMIC. Routing & Switching

CHAPTER 4: ROUTING DYNAMIC. Routing & Switching CHAPTER 4: ROUTING DYNAMIC Routing & Switching CHAPTER4 4.1 Dynamic Routing Protocols 4.2 Distance Vector Dynamic Routing 4.3 RIP and RIPng Routing 4.4 Link-State Dynamic Routing 4.5 The Routing Table

More information

M. Yamuna* et al. International Journal of Pharmacy & Technology

M. Yamuna* et al. International Journal of Pharmacy & Technology ISSN: 0975766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com AMULANCE SERVICE USING MODIFIED DIJKSTRA S ALGORITHM Chhandak agchi, Khushbu Chopra, M. Yamuna* VIT University,

More information

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks Ayad Salhieh Department of Electrical and Computer Engineering Wayne State University Detroit, MI 48202 ai4874@wayne.edu Loren

More information

Optimal Detector Locations for OD Matrix Estimation

Optimal Detector Locations for OD Matrix Estimation Optimal Detector Locations for OD Matrix Estimation Ying Liu 1, Xiaorong Lai, Gang-len Chang 3 Abstract This paper has investigated critical issues associated with Optimal Detector Locations for OD matrix

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

Research on Heterogeneous Communication Network for Power Distribution Automation

Research on Heterogeneous Communication Network for Power Distribution Automation 3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research on Heterogeneous Communication Network for Power Distribution Automation Qiang YU 1,a*, Hui HUANG

More information

Model the P2P Attack in Computer Networks

Model the P2P Attack in Computer Networks International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2015) Model the P2P Attack in Computer Networks Wei Wang * Science and Technology on Communication Information

More information

Routing Protocols and the IP Layer

Routing Protocols and the IP Layer Routing Protocols and the IP Layer CS244A Review Session 2/0/08 Ben Nham Derived from slides by: Paul Tarjan Martin Casado Ari Greenberg Functions of a router Forwarding Determine the correct egress port

More information

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK G.Ratna kumar, Dr.M.Sailaja, Department(E.C.E), JNTU Kakinada,AP, India ratna_kumar43@yahoo.com, sailaja.hece@gmail.com ABSTRACT:

More information

Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1

Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1 Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 22-3 UNICAST ROUTING PROTOCOLS 22.2 A routing

More information

CS644 Advanced Networks

CS644 Advanced Networks Outline CS644 Advanced Networks Lecture 9 Intra Domain Routing Andreas Terzis Spring 2004 1 So far we have talked about E2E mechanisms Routing is the other big component of the network Largest distributed

More information

Network Layer: Routing

Network Layer: Routing Network Layer: Routing The Problem A B R 1 R 2 R 4 R 3 Goal: for each destination, compute next hop 1 Lecture 9 2 Basic Assumptions Trivial solution: Flooding Dynamic environment: links and routers unreliable:

More information

All Rights Reserved 2017 IJARCET

All Rights Reserved 2017 IJARCET END-TO-END DELAY WITH MARKOVIAN QUEUING BASED OPTIMUM ROUTE ALLOCATION FOR MANETs S. Sudha, Research Scholar Mrs. V.S.LAVANYA M.Sc(IT)., M.C.A., M.Phil., Assistant Professor, Department of Computer Science,

More information

Implementation of Parallel Path Finding in a Shared Memory Architecture

Implementation of Parallel Path Finding in a Shared Memory Architecture Implementation of Parallel Path Finding in a Shared Memory Architecture David Cohen and Matthew Dallas Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 12180 Email: {cohend4, dallam}

More information

Module 8. Routing. Version 2 ECE, IIT Kharagpur

Module 8. Routing. Version 2 ECE, IIT Kharagpur Module 8 Routing Lesson 27 Routing II Objective To explain the concept of same popular routing protocols. 8.2.1 Routing Information Protocol (RIP) This protocol is used inside our autonomous system and

More information

Cheapest Paths in Multi-Interface Networks A Distributed Approach

Cheapest Paths in Multi-Interface Networks A Distributed Approach Cheapest Paths in Multi-Interface Networks A Distributed Approach Harish Muthuveeran Shanmugam Department of Engineering and Information Sciences Middlesex University, Greater London Greater London, United

More information

An Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks

An Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks An Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks Timothy Hahn, Shen Wan March 5, 2008 Montana State University Computer Science Department Bozeman,

More information

Varying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network

Varying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network Journal of Computer Science 7 (5): 678-682, 2011 ISSN 1549-3636 2011 Science Publications Varying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network 1 V. Balaji and 2 V. Duraisamy

More information

The General Analysis of Proactive Protocols DSDV, FSR and WRP

The General Analysis of Proactive Protocols DSDV, FSR and WRP Volume 116 No. 10 2017, 375-380 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu The General Analysis of Proactive Protocols DSDV, FSR and WRP 1 Dr.

More information

A Study of Different Parallel Implementations of Single Source Shortest Path Algorithms

A Study of Different Parallel Implementations of Single Source Shortest Path Algorithms A Study of Different Parallel Implementations of Single Source Shortest Path s Dhirendra Pratap Singh Department of Computer Science and Engineering Maulana Azad National Institute of Technology, Bhopal

More information

Youki Kadobayashi NAIST

Youki Kadobayashi NAIST Information Network 1 Routing (1) Youki Kadobayashi NAIST 1 The Routing Problem! How do I get from source to destination?! Which path is best? In terms of:! Number of hops! Delay! Bandwidth! Policy constraints!

More information

Reinforcement learning algorithms for non-stationary environments. Devika Subramanian Rice University

Reinforcement learning algorithms for non-stationary environments. Devika Subramanian Rice University Reinforcement learning algorithms for non-stationary environments Devika Subramanian Rice University Joint work with Peter Druschel and Johnny Chen of Rice University. Supported by a grant from Southwestern

More information

CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS

CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS M.SASIKUMAR 1 Assistant Professor, Dept. of Applied Mathematics and Computational Sciences, PSG College of Technology, Coimbatore, Tamilnadu,

More information

Graphs. The ultimate data structure. graphs 1

Graphs. The ultimate data structure. graphs 1 Graphs The ultimate data structure graphs 1 Definition of graph Non-linear data structure consisting of nodes & links between them (like trees in this sense) Unlike trees, graph nodes may be completely

More information

For example, in the widest-shortest path heuristic [8], a path of maximum bandwidth needs to be constructed from a structure S that contains all short

For example, in the widest-shortest path heuristic [8], a path of maximum bandwidth needs to be constructed from a structure S that contains all short A Note on Practical Construction of Maximum Bandwidth Paths Navneet Malpani and Jianer Chen Λ Department of Computer Science Texas A&M University College Station, TX 77843-3112 Abstract Constructing maximum

More information

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS 1 JAMES SIMS, 2 NATARAJAN MEGHANATHAN 1 Undergrad Student, Department

More information

Course Routing Classification Properties Routing Protocols 1/39

Course Routing Classification Properties Routing Protocols 1/39 Course 8 3. Routing Classification Properties Routing Protocols 1/39 Routing Algorithms Types Static versus dynamic Single-path versus multipath Flat versus hierarchical Host-intelligent versus router-intelligent

More information

Shortest Paths. Nishant Mehta Lectures 10 and 11

Shortest Paths. Nishant Mehta Lectures 10 and 11 Shortest Paths Nishant Mehta Lectures 0 and Communication Speeds in a Computer Network Find fastest way to route a data packet between two computers 6 Kbps 4 0 Mbps 6 6 Kbps 6 Kbps Gbps 00 Mbps 8 6 Kbps

More information

Using The Heuristic Genetic Algorithm in Multi-runway Aircraft Landing Scheduling

Using The Heuristic Genetic Algorithm in Multi-runway Aircraft Landing Scheduling TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.3, March 2014, pp. 2203 ~ 2211 DOI: http://dx.doi.org/10.11591/telkomnika.v12i3.4488 2203 Using The Heuristic Genetic Algorithm in Multi-runway

More information

Outline. (single-source) shortest path. (all-pairs) shortest path. minimum spanning tree. Dijkstra (Section 4.4) Bellman-Ford (Section 4.

Outline. (single-source) shortest path. (all-pairs) shortest path. minimum spanning tree. Dijkstra (Section 4.4) Bellman-Ford (Section 4. Weighted Graphs 1 Outline (single-source) shortest path Dijkstra (Section 4.4) Bellman-Ford (Section 4.6) (all-pairs) shortest path Floyd-Warshall (Section 6.6) minimum spanning tree Kruskal (Section 5.1.3)

More information

Redes de Computadores. Shortest Paths in Networks

Redes de Computadores. Shortest Paths in Networks Redes de Computadores Shortest Paths in Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto » What is a graph?» What is a spanning tree?» What is a shortest path tree?» How are

More information

Minimum Cost Edge Disjoint Paths

Minimum Cost Edge Disjoint Paths Minimum Cost Edge Disjoint Paths Theodor Mader 15.4.2008 1 Introduction Finding paths in networks and graphs constitutes an area of theoretical computer science which has been highly researched during

More information

Shortest Paths. Nishant Mehta Lectures 10 and 11

Shortest Paths. Nishant Mehta Lectures 10 and 11 Shortest Paths Nishant Mehta Lectures 0 and Finding the Fastest Way to Travel between Two Intersections in Vancouver Granville St and W Hastings St Homer St and W Hastings St 6 Granville St and W Pender

More information

Spanning Trees, greedy algorithms. Lecture 22 CS2110 Fall 2017

Spanning Trees, greedy algorithms. Lecture 22 CS2110 Fall 2017 1 Spanning Trees, greedy algorithms Lecture 22 CS2110 Fall 2017 1 We demo A8 Your space ship is on earth, and you hear a distress signal from a distance Planet X. Your job: 1. Rescue stage: Fly your ship

More information

UNIT 2 ROUTING ALGORITHMS

UNIT 2 ROUTING ALGORITHMS UNIT ROUTING ALGORITHMS Routing Algorithms Structure Page Nos..0 Introduction 3. Objectives 3. Flooding 3.3 Shortest Path Routing Algorithm 5.4 Distance Vector Routing 6.4. Comparison.4. The Count-to-Infinity

More information

Graphs. The ultimate data structure. graphs 1

Graphs. The ultimate data structure. graphs 1 Graphs The ultimate data structure graphs 1 Definition of graph Non-linear data structure consisting of nodes & links between them (like trees in this sense) Unlike trees, graph nodes may be completely

More information

Performance Measurement of Dijkstra using WSN: A Review

Performance Measurement of Dijkstra using WSN: A Review Performance Measurement of Dijkstra using WSN: A Review Anu Dahiya 1 and Vinit Kumar 2 1 M.Tech. Scholar, CSE Department, VCE, Rohtak, Haryana (India) anudahiya003.ad@gmail.com 2 Assistant Professor, CSE

More information

In this edition of HowStuffWorks, we'll find out precisely what information is used by routers in determining where to send a packet.

In this edition of HowStuffWorks, we'll find out precisely what information is used by routers in determining where to send a packet. How Routing Algorithms Work by Roozbeh Razavi If you have read the HowStuffWorks article How Routers Work, then you know that a router is used to manage network traffic and find the best route for sending

More information

A Review: Optimization of Energy in Wireless Sensor Networks

A Review: Optimization of Energy in Wireless Sensor Networks A Review: Optimization of Energy in Wireless Sensor Networks Anjali 1, Navpreet Kaur 2 1 Department of Electronics & Communication, M.Tech Scholar, Lovely Professional University, Punjab, India 2Department

More information

Routing, Routing Algorithms & Protocols

Routing, Routing Algorithms & Protocols Routing, Routing Algorithms & Protocols Computer Networks Lecture 6 http://goo.gl/pze5o8 Circuit-Switched and Packet-Switched WANs 2 Circuit-Switched Networks Older (evolved from telephone networks), a

More information

Routing Algorithms. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Routing Algorithms. Daniel Zappala. CS 460 Computer Networking Brigham Young University Routing Algorithms Daniel Zappala CS 460 Computer Networking Brigham Young University Routing 2/20 How does the Internet determine which path to use from the source to the destination? Challenges need

More information

The Gene Modular Detection of Random Boolean Networks by Dynamic Characteristics Analysis

The Gene Modular Detection of Random Boolean Networks by Dynamic Characteristics Analysis Journal of Materials, Processing and Design (2017) Vol. 1, Number 1 Clausius Scientific Press, Canada The Gene Modular Detection of Random Boolean Networks by Dynamic Characteristics Analysis Xueyi Bai1,a,

More information

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, July 18, ISSN

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, July 18,  ISSN International Journal of Computer Engineering and Applications, Volume XII, Special Issue, July 18, www.ijcea.com ISSN 2321-3469 MULTICAST ROUTING: CONVENTIONAL ALGORITHMS VS ANT COLONY SYSTEM ABSTRACT

More information

Regression Based Cluster Formation for Enhancement of Lifetime of WSN

Regression Based Cluster Formation for Enhancement of Lifetime of WSN Regression Based Cluster Formation for Enhancement of Lifetime of WSN K. Lakshmi Joshitha Assistant Professor Sri Sai Ram Engineering College Chennai, India lakshmijoshitha@yahoo.com A. Gangasri PG Scholar

More information

Computer Networking. Intra-Domain Routing. RIP (Routing Information Protocol) & OSPF (Open Shortest Path First)

Computer Networking. Intra-Domain Routing. RIP (Routing Information Protocol) & OSPF (Open Shortest Path First) Computer Networking Intra-Domain Routing RIP (Routing Information Protocol) & OSPF (Open Shortest Path First) IP Forwarding The Story So Far IP addresses are structured to reflect Internet structure IP

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

Graphs. Part II: SP and MST. Laura Toma Algorithms (csci2200), Bowdoin College

Graphs. Part II: SP and MST. Laura Toma Algorithms (csci2200), Bowdoin College Laura Toma Algorithms (csci2200), Bowdoin College Topics Weighted graphs each edge (u, v) has a weight denoted w(u, v) or w uv stored in the adjacency list or adjacency matrix The weight of a path p =

More information

Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks

Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks Guangyan Huang 1, Xiaowei Li 1, and Jing He 1 Advanced Test Technology Lab., Institute of Computing Technology, Chinese

More information

A priority based dynamic bandwidth scheduling in SDN networks 1

A priority based dynamic bandwidth scheduling in SDN networks 1 Acta Technica 62 No. 2A/2017, 445 454 c 2017 Institute of Thermomechanics CAS, v.v.i. A priority based dynamic bandwidth scheduling in SDN networks 1 Zun Wang 2 Abstract. In order to solve the problems

More information

AN OPTIMIZATION GENETIC ALGORITHM FOR IMAGE DATABASES IN AGRICULTURE

AN OPTIMIZATION GENETIC ALGORITHM FOR IMAGE DATABASES IN AGRICULTURE AN OPTIMIZATION GENETIC ALGORITHM FOR IMAGE DATABASES IN AGRICULTURE Changwu Zhu 1, Guanxiang Yan 2, Zhi Liu 3, Li Gao 1,* 1 Department of Computer Science, Hua Zhong Normal University, Wuhan 430079, China

More information

1 More on the Bellman-Ford Algorithm

1 More on the Bellman-Ford Algorithm CS161 Lecture 12 Shortest Path and Dynamic Programming Algorithms Scribe by: Eric Huang (2015), Anthony Kim (2016), M. Wootters (2017) Date: May 15, 2017 1 More on the Bellman-Ford Algorithm We didn t

More information

Figure 1. Clustering in MANET.

Figure 1. Clustering in MANET. Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

The Load Balancing Research of SDN based on Ant Colony Algorithm with Job Classification Wucai Lin1,a, Lichen Zhang2,b

The Load Balancing Research of SDN based on Ant Colony Algorithm with Job Classification Wucai Lin1,a, Lichen Zhang2,b 2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA 2016) The Load Balancing Research of SDN based on Ant Colony Algorithm with Job Classification Wucai Lin1,a, Lichen Zhang2,b

More information

Youki Kadobayashi NAIST

Youki Kadobayashi NAIST Information Network 1 Routing (1) Image: Part of the entire Internet topology based on CAIDA dataset, using NAIST Internet viewer Youki Kadobayashi NAIST 1 The Routing Problem! How do I get from source

More information

A Path Planning Method for Substation Laser Inspection Robot Based on Improved Ant Colony Algorithm

A Path Planning Method for Substation Laser Inspection Robot Based on Improved Ant Colony Algorithm 2nd International Conference on Computer Engineering, Information Science & Application Techlogy (ICCIA 2017) A Path Planning Method for Substation Laser Inspection Robot Based on Improved Ant Colony Algorithm

More information

Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1]

Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Presenter: Yongcheng (Jeremy) Li PhD student, School of Electronic and Information Engineering, Soochow University, China

More information

Constrained Minimum Spanning Tree Algorithms

Constrained Minimum Spanning Tree Algorithms December 8, 008 Introduction Graphs and MSTs revisited Minimum Spanning Tree Algorithms Algorithm of Kruskal Algorithm of Prim Constrained Minimum Spanning Trees Bounded Diameter Minimum Spanning Trees

More information

Optimization of Ant based Cluster Head Election Algorithm in Wireless Sensor Networks

Optimization of Ant based Cluster Head Election Algorithm in Wireless Sensor Networks Optimization of Ant based Cluster Head Election Algorithm in Wireless Sensor Networks Siddharth Kumar M.Tech Student, Dept of Computer Science and Technology, Central University of Punjab, Punjab, India

More information

DHANALAKSHMI COLLEGE OF ENGINEERING, CHENNAI. Department of Computer Science and Engineering CS6301 PROGRAMMING DATA STRUCTURES II

DHANALAKSHMI COLLEGE OF ENGINEERING, CHENNAI. Department of Computer Science and Engineering CS6301 PROGRAMMING DATA STRUCTURES II DHANALAKSHMI COLLEGE OF ENGINEERING, CHENNAI Department of Computer Science and Engineering CS6301 PROGRAMMING DATA STRUCTURES II Anna University 2 & 16 Mark Questions & Answers Year / Semester: II / III

More information

EDCA LIMITATION WITH HIGH TRAFFIC REAL TIME APPLICATIONS

EDCA LIMITATION WITH HIGH TRAFFIC REAL TIME APPLICATIONS EDCA LIMITATION WITH HIGH TRAFFIC REAL TIME APPLICATIONS 1 AHMED ABU-KHADRAH, 2 ZAHRILADHA ZAKARIA, 3 MOHDAZLISHAH OTHMAN 1,2,3 Centre for Telecommunication Research and Innovation (CeTRI), Faculty of

More information