Spare Capacity Planning Using Survivable Alternate Routing for Long-Haul WDM Networks

Size: px
Start display at page:

Download "Spare Capacity Planning Using Survivable Alternate Routing for Long-Haul WDM Networks"

Transcription

1 Spare Capacity Planning Using Survivable lternate Routing for Long-Haul WDM Networks in Zhou an Hussein T. Mouftah Department of lectrical an Computer ngineering Queen s University, Kingston, Ontario, K7L 3N6 Canaa {zhoubi,mouftah}@ee.queensu.ca bstract Spare capacity planning is to fin the minimum amount of spare capacity to be allocate throughout a network so that the network can survive from network component failures. In this paper, the spare capacity planning problem is investigate for long haul wavelength ivision multiplexing (WDM) networks. three-step metho is evelope for solving the problem. First, heuristic approaches are use to select both caniate working routes an protection routes in orer to achieve approximate optimal performance while maintaining a computational feasibility. Secon, traffic requests are istribute on the obtaine caniate working an protection routes optimally using genetic algorithms (G). Finally wavelengths are assigne to working lightpaths an share protection lightpaths. The major avantage of the new approach is the ability to incorporate nonlinear constraints an nonlinear cost functions into the G, which are introuce by sharing protection links between share risk link groups (SRLG). Moreover, by consiering SRLG constraints in the spare capacity planning phase, wavelengths can be allocate to each share protection route before failures happen, so that shorter restoration latency can be achieve. Numerical results illustrate that the propose approach is more cost-effective than the single-path protection metho. 1. Introuction ackgroun Wavelength Division Multiplexing (WDM), which allows a single fiber to carry multiple signals simultaneously, will soon become the core technology to cope with the rapily increasing eman for banwith in the next generation Internet. n averse result of exploiting this avance technology is the increase network vulnerability in the sense that a single network failure can significantly reuce the capability to eliver services in large-scale information systems. Therefore, network survivability has been a crucial concern in highbanwith optical network. Survivable network architectures are base on either eicate resources, or share resources. With eicate protection, such as 1+1 an 1:1 protection, network service is restore with the eicate network resources. In the occurrence of a failure, the traffic is switche to the pre-configure protection lightpaths or links. Deicate protection has very low recovery latency an can guarantee full restoration against single network failures. However, it will result in inefficient use of network resources. In contrast, with share protection, network protection resource can be use for several ifferent failure scenarios. Major research efforts on share protection schemes focus on reucing the resource overhea by means of techniques such as sharing resources across connections or between isjoint lightpaths for the same connection. Unlike the eicate scheme, a connection can be establishe over the share protection resources only after a network failure is etecte. Share protection approaches can be classifie into link protection an path protection. In link restoration, all the connections that traverse the faile link are reroute aroun that link. The source an estination noes of the connections traversing the faile link are oblivious to the link failure. In path restoration, when a link fails, the source noe an the estination noe of each connection that traverses the faile link are informe of the failure. The source an the estination noes of each connection inepenently reroute the traffic to backup routes on an en-to-en basis. Link protections are expecte to have shorter recovery latency than path protections. However, it has been reporte that share path protection schemes are more economical than link protections in the sense that they require much lower reunant network resources. Moreover, path protections are more feasible than link protections with available technologies. Link protection schemes epen on fault localization, while no fault localization is necessary for path protection. Path rerouting performe at the ege of the network may allow some or all of the recovery functions to be move into the en-system. Thus, it simplifies network esign, an allows applications to make use of application specific information such as tolerance for latency in making rerouting ecisions. ccoringly, this paper focuses on esigning cost-efficient path protection algorithms. Proceeings of the Seventh International Symposium on Computers an Communications (ISCC ) / $ I

2 1. 2. Relate work Many stuies have been to proviing cost-effective protection schemes for WDM networks [1-13]. Protection esign aims to protecting network services from a set of failure scenarios, such as a single span cut, or a noe loss. Protection esign methos can be classifie into two categories: inepenent esign an coorinate esign [6]. Inepenent esign consiers failure scenarios inepenently, in contrast, coorinate esign consiers planning all reconfigurations simultaneously for several failure scenarios, in a coorinate manner. In [6], lanyali, an yanoglu evaluate two iterative methos, inepenent an coorinate esigns, through simulation for three restoration schemes: full reconfiguration, path-base, an link-base. The numerical results showe that coorinate esign with full reconfiguration achieves the most economical solutions in terms of fiber requirements. They also showe that coorinate planning of several failure scenarios provies more efficient esigns than those obtaine by consiering the failures inepenently. The iterative methos nee much shorter computational time than centralize optimization metho using CPLX. However, the solutions obtaine from the iterative methos are not approximately optimal. ecause increasing the number of iterations cannot result in improve solutions in any case. Some other work consiers all possible scenarios together in coorinate esigning without using iterative approaches [1-5, 9,13]. Typically, the path protection problem is to optimally etermine two isjoint alternate paths, a working path an a protection path, for each source-estination pair, so as to minimize require network capacity an cost. However, these algorithms unnecessarily restrict that all traffic for each noe pair follows the same working path an protection path after failures. In contrast, an optimal esign scheme for survivable WDM transport networks is propose in [3], which focuse on optimally istribute traffic among several caniate working path an protection path pairs. However, the algorithm requires that a single restoration path is preetermine for each working path on a one-toone basis. In this paper, we name this approach as singleprotection path metho. Most of the previous work on spare capacity allocation of mesh WDM networks moele the static protection esign as an integer linear programming (ILP) problem. The esign objective is to minimize the total spare capacity require for the restoration in specific failure scenarios. Unfortunately, the resulte ILP formulation is NP-har [13]. To obtain the optimal solution for even a small size network, such as a few tens of noes, is very time consuming using available mathematical tools. Relaxation methos are propose to approximate the IP solution. Lagarangian relaxation, which ecomposes the original complex problem into several easier subproblems, was use by Doshi et al [9]. Simulate annealing an Tabu searching base methos were propose in [1,13] an [2] respectively Our approaches In this work, our objective is to solve the spare capacity planning problem efficiently for long-haul optical networks, where traffic matrix is known for network planner. Centralize optimization is evelope to esign cost-effective path protection for all traffic requests. Then the erive protection results are loae to each source noe of traffic requests, so that upon a network failure, a istribute restoration algorithm can be activate to reroute the traffic to backup lightpaths. survivable alternate routing algorithm is evelope in this paper, which improves the performance of previous work using the following schemes: In orer to reuce the computational complexity of the spare capacity planning problem, a set of caniate working routes an corresponing caniate protection routes for each wavelength request are pre-compute an use to compose the search space for the esign variables. In this paper, we present a survivable routing algorithm, which can calculate a set of caniate working routes an several isjoint caniate protection routes for each working route. To istinguish our metho, we name it as multi-path protection. Multi-path protection can istribute traffic more evenly over networks, thus sharability of protection paths can be improve. The traeoff of multi-path protection is that more complex restoration signaling is necessary after occurrence of failures. Multiple signaling proceures must be simultaneously performe for all of these restoration paths. However, the increase of the complexity is not significant. To aress the share path protection problem, the Share Risk Link Group (SRLG) concept is consiere as one of the most important constraints concerning the constraint-base route computation of optical channel routes [15]. share risk link group is efine as a group of links that share a component which failure causes the failure of all links of the group. We efine sharable protection link group (SPLG) as collections of protection routes which corresponing primary routes o not belong to any SRLG. SRLG constraints can be efine as follows: protection paths can share links if an only if they belong to a common SPLG. Knowing which fibers are in share risk groups is very ifficult, because logical isjoint paths may not be physically iverse [14]. In the existing transport networks, ientification of SRLGs is not conucte effectively. However, recently, management Proceeings of the Seventh International Symposium on Computers an Communications (ISCC ) / $ I

3 an istribution of SRLG information has receive attention from both inustry [18] an Internet ngineering Task Force [19]. y applying the SRLG constraint to the constraintbase path computation, one can select a route taking into account resource an logical structure isjointness that implies a lower probability of simultaneous lightpath failure. However, to the best of our knowlege, general SRLG constraints were selom consiere explicitly in previous work in globally optimizing pre-compute path protection esigns for static traffic moels. Without consiering SRLG constraints, the reserve restoration capacity is either over-reserve or uner-reserve for protection. The typical example of the former case is 1:1 protection, which results in costly esign because of capacity reunancy. In [5], protection paths for a single eman can share reserve banwith uner the conition that their working paths are mutually isjoint. However, the metho can be improve by applying more general SRLG constraints. In the latter case, protection paths can be multiplexe by other working paths or protection paths without SRLG constrains to reuce network resource reunancy. However these methos result in partial restoration after failures happen. nother effect of neglecting SRLG constraints at protection esign stage is that wavelength allocation for backup paths has to be one ynamically after network failures occur [9]. For longhaul WDM networks, the propagation elay of control signaling is long, which contributes significantly the restoration latency. In our approach with the consieration of SRLG in protection esign, wavelengths are allocate to each backup path at esign stage. Thus, it results in short restoration latency. The remainer of this paper is organize as follows: In Section II, fixe survivable alternate route selection an wavelength routing algorithm is presente. The survivable alternate routing with consieration of SRLG constraints is formulate as a non-linear integer programming problem. n approximate solution using genetic algorithms is introuce. Section III presents simulations an numerical results of the propose routing algorithms. Section IV summarizes an conclues the paper. 2. Survivable lternate Routing We propose a survivable alternate routing (SR) heuristic to simplify the searching of working paths an protection paths. We efine a working route set (WRS) between a source noe an a estination noe as a set of pre-compute caniate routes, through which wavelength requests between the noe pair is route. protection route set (PRS) for a working route rw is a set of caniate isjoint routes of rw, through which wavelength requests on rw are reroute accoring to pre-reserve banwith on each backup route if the working route rw is broken. Working routes an protection routes can be either inactive or active. route is active when banwith (wavelengths) is reserve along the route for a traffic request. D F Working path Protection path Figure 1. WRS an PRS Figure 1. shows two working routes, --C-H an - D--H from noe to noe H. For each working route, two backup routes is assigne, e.g. -D--H an -F-G- H are backup routes for --C-H; --C-H an -F-G-H backup -D--H. The SR can be realize as follows: First, for each source an estination pair a set of working routes is precompute using k-shortest path routing algorithm [22]. The maximum size of WRSs is Kw. The Kw shortest routes o not have to be mutually isjoint. Secon, for each working path, up to Kp isjoint backup paths are searche using breath first protection path searching algorithm. In practice, the size of the route sets, Kw an Kp, is below ten, typically 2 to 6. Then a lightpath layout algorithm is execute to establish working lightpaths over the WRSs, an to eploy protection lightpath over the corresponing PRSs. The optimization objective of lightpath layout algorithm is to minimize the total number of wavelengths use on each optical link. The consiere networks are flat all-optical mesh networks. ach noe in the networks enotes an optical channel-switching router, which is strictly bufferless. In the networks, each link inclues two uniirectional fibers, one for each irection, an each fiber can be multiplexe by numbers of wavelengths. anwith requests are in terms of numbers of lightpaths (wavelengths). Figure 2 shows an example result of spare capacity planning by using survivable alternate routing. Traffic requests, working lightpaths, reserve backup lightpaths an the wavelengths allocate for them are shown in Table 1. This example also shows the avantage of multi-path protection. With multi-path protection, banwith can be reserve for protecting working path - on both backup paths, -C-D- an -C--F-D-, so that the traffic can be balance better than that in single-path protection case C G H Proceeings of the Seventh International Symposium on Computers an Communications (ISCC ) / $ I

4 (in this example, no solution can be foun to satisfy all traffic requirements with single-path protection). C λ 2 D F Working path ackup path Figure 2. lternate survivable routing Table 1. n example of alternate survivable routing. WP, λ w : working path an wavelength ID reserve for traffic along the working path, P, λ p : backup path an wavelength ID reserve along the protection path. S-D PIR TRFFIC WP, λ W P, λ P 3 -, 1 -, 2 -, 3 -C-D-, 1 -C-D-, 2 -C--F-D-,3 C D 1 C-D, 3 C--F-D, 3 F 2 -F, 1 -F, 2 -C-D-F, 1 -C-D-F, reath first protection path searching algorithm We evelope an algorithm to search a protection route set for each primary path. We assume that, after the failure of the primary path, it is not necessary to provie the same quality of service in terms of propagation elay on the protection path. Since one of the main objectives of esigning share path protection is to reuce the banwith reunancy by improving the sharing of protection banwith among ifferent SRLGs. ccoringly, we select protection paths base on their iversity other than their cost (elay). The more iverse the protection paths in a protection route set are, the more common backup links can be share by the working paths belonging to ifferent SRLGs. For this reason, instea of using the k-shortest path algorithm to generate PRS, a breath first iverse routing algorithm is evelope. To search protection paths for a working path, a tree is generate from the original network topology graph by eleting the intermeiate noes an links in the working path. Let the source noe be the root noe of the tree. breath first searching metho is use to search the protection paths from root noe to estination noe. Let k enote the traverse times of backup link () by backup paths in the kth protection route set of traffic request, thus, once a new backup path is foun for kth k working path of, increases its counts. To make the obtaine backup paths as iverse as possible, we confine between one to a certain pre-efine value K l which k is less than K p. If k >K l, then the newly foun protection path will not be inclue in the backup route set, an the searching proceure continues until K p protection paths are foun or the last leaf noe is reache. Figure 3. shows the tree generate for working path -- C-H. Protection paths, -D--H, -F-G-H, -D--G-H, -D-F-G-H, -F-D--H, -D-F-G--H, an -F-D--G- H are obtaine sequentially by using broa first searching algorithm. If K l =2 an K p =4, only the -D--H, -F-G- H, an -D--G-H are eligible solutions D F D G G H G H H H G H H Figure 3. reath first backup path searching tree Survivable alternate routing We efine the following notation. N = the set of noes L = the set of links C = the cost for link (), which can be consiere as propagation elay (in time units) over the link λ s = the banwith requirement from noe s to noe in term of number of wavelengths as the basic unit W = the maximum number of wavelength per fiber X = a set of working paths that use link (i, j) Y = a set of backup paths that use link (i,j) Z s = the set of working paths between source noe s an estination noe = the total amount of banwith reserve by active paths that use link (i, j) = the total amount of banwith reserve by backup paths that use link () R w = the set of all working paths, which are numbere from 1 to K p N(N-1) R wk = the kth working path in R w P uv = the uth protection path in PRS of R wv H F Proceeings of the Seventh International Symposium on Computers an Communications (ISCC ) / $ I

5 c k = the amount of banwith is route through the working path R wk uv = the amount of banwith on the backup route P uv Without loss of generality, we assume that paths that share a common link belong to a SRLG. Therefore, X also enotes a SRLG, in which all paths share link (). Then, = c k v P uv an k X uv = c = u Max uv ( mn), ( mn) ( ) u X mn, v Y Constraints: ( ) ( c k k Z s + ) W = λ s Optimality Criterion: Cost Optimization O a : Minimizing ( ) Loa balancing O b : Minimizing ( ) C + ( ) Max + ( ) ecause in most cases, there is no optimal solution which can satisfy all the criteria at the same time. Some compromises have to be mae. Let O an O max* b max* a enote the estimate maximum value of O a, an O b respectively. The objective function can be formulate as follows: O Min + O a b ( wa w max* b max* Oa Ob where w a an w b are the weights for optimality criterion a) an b), respectively. For the above moel, the optimization problem is to fin, between a source an a estination, a set of optimal routes that give the largest amount of resiual banwith along the routes while satisfying the specifie constraints on routing cost. Since the banwith allocate in WDM networks is in number of wavelengths, it is obvious that the formulate problem is an non-linear integer programming problem with multiple objectives. It can be easily proven that it is an NP-har problem. In practice, approximate algorithms are neee to solve such a problem for a large WDM network. ecause integer programming methos involve long computing perio an high computation intensity to get an optimal istribution of traffic over the route sets, we ) evelop a survivable routing algorithm base on Genetic lgorithms (G) to efficiently search approximately optimal solutions. Compute WPSs an PPSs Generate initiate traffic partitions valuate solutions base on: Mutation cost optimization loa balancing Crossover Selection Meet optimization no criteria? yes llocate wavelengths Figure 4. Survivable alternate routing using G G is a stochastic search metho that mimics the metaphor of natural biological evolution. G operates on a population of potential solutions applying the principle of survival of the fittest to prouce better an better approximations to a solution. t each generation, a new set of approximations is create by the process of selecting iniviuals accoring to their level of fitness in the problem omain an breeing them together using genetic operators, i.e. crossover an mutation, borrowe from natural genetics. This process leas to the evolution of populations of iniviuals that are better suite to their environment than the iniviuals that they were create from, just as in natural aaptation. The programming iagram for traffic partitioning using G is shown in Figure 4. Optimization Criteria in G can be an estimate acceptable value of the objective function, an/or a number of generations in G. λ 1 µ 1 S 01 S S (N-1)(N-3) S (N-1)(N-2) λ 2 µ 2 λ K w 1 µ K p 1 µ λ K w Figure 5. G coing of survivable alternate routing The coing of solusion space is illustrate in Figure 5., where S enotes the traffic eployment for noe pair (i,j), ( i, j) λ enotes the traffic loa allocate on the kth working k, ) route of noe pair (i,j), an µ ( i j enotes the banwith l reserve on the lth protection route of the corresponing working route of noe pair (i,j). The length of the chromosome is N (N-1) K w K p. In practice, only the noe pairs which have traffic requests are consiere, thus a compact chromosome coing can be use. K p Proceeings of the Seventh International Symposium on Computers an Communications (ISCC ) / $ I

6 2. 3. Wavelength assignment Given a set of primary paths an backup paths, as well as the wavelength requests on each path, wavelengths can be assigne for each primary path an backup path so that no two primary paths traversing over a fiber link use the same wavelength, an two or more backup paths can share the same wavelength over a fiber link if an only if they belong to ifferent SRLGs. For large-scale networks with arbitrary topology, assigning wavelengths optimally to various lightpaths has been shown to be NP-har in [21]. We use G to solve the wavelength assignment problem. The optimization aims at minimizing the total number of require wavelengths to satisfy the traffic requests an protection requirements. 3. Simulations an numerical results To evaluate the survivable alternate routing algorithm, the numerical results reporte in this section are base on simulations that are conucte using a WDM network planning tool. The tool is evelope using C++ an runs in a Microsoft Winows environment. few objectoriente class libraries have been evelope incluing topology iscovery algorithm, k-shortest path routing, breath first iverse routing, genetic algorithms, wavelength assignment algorithms, an so on. The simulations are conucte on the network topologies shown in Figure 6. ach noe has a fully configurable optical switch, which can connect any wavelength in an ingress fiber to any egress fiber using the same wavelength. Network Network Figure 6. Network topologies use in the simulations Non-uniforme traffic matrixes are generate ranomly. First, traffic patterns are generate for each simulation. traffic pattern specifies the approximate volume of traffic between each noe pair. Three kins of patterns are efine: high volume, meium volume, an low volume. ach kin of pattern is mappe a pre-efine banwith range. Then the traffic matrix is generate, where banwith requirement for each noe pair is generate ranomly accoring to the preefine pattern. The main evaluation metric consiere in this work is the network reunancy ratio (C r ), which is efine as the ratio of the total spare capacity over the total working capacity: C r = ( ) ( ) Network reunancy highly epens on the network topology as well as the spare capacity allocation algorithms use. Using eicate path protection schemes, generally C r is over 100%. Without explicitly consiering SRLG constraints, the share path protection scheme propose in [6] obtaine much lower C r, from 74% to 87% for a thirty-two noe network. However the algorithm epen on fault localization. We compare the multi-path protection scheme with a single-path scheme by using ifferent traffic matrix over the two simulation topologies, the ten noe network an the twenty-three noe network. The numerical results are given in Table 2., which show that the multi-path protection scheme can obtain about a 20% reuction of network reunancy compare with the single-path protection metho. In turn, this reuces the cost of the survivable WDM network in terms of total number of wavelength require for certain traffic requests. Table 2. Comparison of Single-path protection an multi-path protection. T: number of active noe pairs; λ w : total wavelength require with no protection; λ p : total wavelength require with full protection. NTWORK T λ W SINGL-PTH MULTI-PTH PROTCTION PROTCTION λ p C r λ p C r % 10 51% % 14 49% % 19 46% % 14 58% % 17 54% % 19 55% 4. Conclusions This work aims at proviing cost-effective esign of survivable WDM long-haul networks with static traffic. survivable alternate routing metho is propose in this paper. Heuristic approaches are implemente to select both working routes an protection routes in orer to achieve approximate optimal performance while maintaining a computational feasibility. xplicit SRLG constraints are applie in the new metho. Therefore, more cost-effective network esigns an shorter restoration time can be achieve. The numerical results show that the multi-path protection metho outperforms single path protection approaches in terms of the resulting network reunancy. Proceeings of the Seventh International Symposium on Computers an Communications (ISCC ) / $ I

7 Reference: [1]. V. Caenegem, W. V. Parys, F. D. Turck, an P. M. Demeester, Dimensioning of Survivable WDM Networks, I J. Select. reas Commun., vol. 16, no. 7, Sep. 1998, pp [2] O. Crochat, an Jean-Y. L. ouec, Design Protection for WDM Optical Networks, I J. Select. reas Commun., vol. 16, no. 7, Sep. 1998, pp [3] Y. Miyao an H. Saito, Optimal Design an valuation of Survivable WDM Transport Networks, I J. Select. reas Commun., vol. 16, no. 7, Sep. 1998, pp [4] S. Ramamurthyt an. Mukherjee, Survivable WDM Mesh Networks, Part I - Protection, INFOCOM '99. Proceeings. I, Vol. 2, 1999 pp [5] R. D. Davis, K. Kumaran, G. Liu, an I. Saniee, "Spier: simple an Flexible Tool for Design an Provisioning of Protecte Lightpaths in Optical Networks", Vol. 6, No. 1, Jan-Jun, 2001, pp [6] M. lanyali, an. yanoglu, Provisioning algorithms for WDM optical networks I/CM Trans. Net., vol. 7, no. 5, Oct. 1999, pp [7] G. Shen, et. al., Designing WDM optical network for reliability: routing light paths efficiently for path protection Optical Fiber Communication Conference 2000, Vol. 3, pp [8]. Moiano,. Narula-Tam, Survivable routing of logical topologies in WDM networks, INFOCOM Proceeings. I, Vol. 1, 2001, pp [9]. T. Doshi, et. al., Optical Network Design an Restoration, ell Labs Tech. Journal, Vol. 4, No. 1, Jan- Mar, 1999, pp [10] O. Gerstel, an R. Ramaswami, Optical Layer Survivability n Implementation Perspective, I J. Select. reas Commun., VOL. 18, NO. 10, OCTOR 2000 pp [11] Rubin, an J. Ling, Failure Protection Methos for Optical Meshe-Ring Communications Networks, I J. Select. reas Commun., VOL. 18, NO. 10, OCTOR 2000 pp [12] R. R. Iraschko, an W. D. Grover, highly ffienct Path- Restoration Protocol for Management of Opical Network Transport Integrity, I J. Select. reas Commun., vol. 18, No. 5, May 2000 pp [13] Y. Liu, D. Tipper, an P. Siripongwuikorn, pproximating Optimal Spare Capacity llocation by Successive Survivable Routing, INFOCOM Proceeings. I, vol. 1, 2001 [14]. Zhou, an H. T. Mouftah, alance lternate Routing for WDM networks, ISTD International Conference Wireless an Optical Communication 2001, anff, Canaa, July 17-19, 2001 [15]. Zhou, an H. T. Mouftah, aptive lternate Routing for Multi-fiber WDM Networks Using pproximate Congestion Information, International Conference on Communication (ICC20), New York City, US, pril 28-May 2, 20 [16] N. Ghani, S. Dixit, an T. Wang, On IP-Over-WDM Integration, I Commun. Mag., vol. 38, no. 3, Mar. 2000, pp [17] J. Luciani et al., IP over Optical Networks Framework, Internet Draft, Work in progress, raft-many-ip-opticalframework-03.txt, March [18] P. Sebos, J. Yates, G. Hjalmtysson an. Greenberg, "uto-iscovery of Share Risk Link Groups," Optical Fiber Commun. Conf., March 2001 [19] D. Papaimitriou et al, Inference of Share Risk Link Groups, Internet Draft, Work in progress, raft-manyinference-srlg-01.txt, July 2001 [20] Z. Zhang an. S. campora, Heuristic Wavelength ssignment lgorithm for Multihop WDM Networks with Wavelength Routing an Wavelength Re-Use, I/CM Trans. Net., Vol. 3, No. 3, pp , 1995 [21] D. Saha, M.D. Purkayastha, an. Mukherjee, n approach to wie area WDM optical network esign using genetic algorithm, Computer Communications, 22 (1999) pp [22] S. W. Lee an C. S. Wu, "K-est paths algorithm for Highly Reliable Communication Networks", IIC Trans. Commu. Vol.82-, No.4, pp , 1999 Proceeings of the Seventh International Symposium on Computers an Communications (ISCC ) / $ I

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:

More information

One-to-Many Multicast Restoration Based on Dynamic Core-Based Selection Algorithm in WDM Mesh Networks

One-to-Many Multicast Restoration Based on Dynamic Core-Based Selection Algorithm in WDM Mesh Networks Proceeings of the International MultiConference of Engineers an Computer Scientists 9 Vol I IMECS 9, March 18 -, 9, Hong Kong One-to-Many Multicast Restoration Base on Dynamic Core-Base Selection Algorithm

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks

A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks Wojciech Molisz and Jacek Rak Gdansk University of Technology, G. Narutowicza 11/12, Pl-8-952 Gdansk, Poland

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University

More information

Lab work #8. Congestion control

Lab work #8. Congestion control TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

Fault-Tolerant Design of Wavelength-Routed Optical. Networks. S. Ramamurthy and Biswanath Mukherjee

Fault-Tolerant Design of Wavelength-Routed Optical. Networks. S. Ramamurthy and Biswanath Mukherjee DIMACS Series in Discrete Mathematics and Theoretical Computer Science Fault-Tolerant Design of Wavelength-Routed Optical Networks S. Ramamurthy and Biswanath Mukherjee Abstract. This paper considers optical

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita

More information

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks Provisioning Virtualize Clou Services in IP/MPLS-over-EON Networks Pan Yi an Byrav Ramamurthy Department of Computer Science an Engineering, University of Nebraska-Lincoln Lincoln, Nebraska 68588 USA Email:

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

IO2654 Optical Networking. WDM network design. Lena Wosinska KTH/ICT. The aim of the next two lectures. To introduce some new definitions

IO2654 Optical Networking. WDM network design. Lena Wosinska KTH/ICT. The aim of the next two lectures. To introduce some new definitions IO2654 Optical Networking WDM network design Lena Wosinska KTH/ICT 1 The aim of the next two lectures To introduce some new definitions To make you aware about the trade-offs for WDM network design To

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

OPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005

OPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005 OPTICAL NETWORKS Virtual Topology Design A. Gençata İTÜ, Dept. Computer Engineering 2005 Virtual Topology A lightpath provides single-hop communication between any two nodes, which could be far apart in

More information

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -

More information

On the Placement of Internet Taps in Wireless Neighborhood Networks

On the Placement of Internet Taps in Wireless Neighborhood Networks 1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter FDL sel. VOA SOA 100 Regular papers ONDM 2018 Scalable Deterministic Scheuling for WDM Slot Switching Xhaul with Zero-Jitter Bogan Uscumlic 1, Dominique Chiaroni 1, Brice Leclerc 1, Thierry Zami 2, Annie

More information

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member

More information

Image Segmentation using K-means clustering and Thresholding

Image Segmentation using K-means clustering and Thresholding Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,

More information

Dynamic Capacity Allocation in OTN Networks

Dynamic Capacity Allocation in OTN Networks Communications an Network, 2015, 7, 43-54 Publishe Online February 2015 in SciRes. http://www.scirp.org/journal/cn http://x.oi.org/10.4236/cn.2015.71005 Dynamic Capacity Allocation in OTN Networks Maria

More information

Optimal Oblivious Path Selection on the Mesh

Optimal Oblivious Path Selection on the Mesh Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract

More information

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA Preprint, August 5, 2018. 1 All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA Mikhail Ivanov, Frerik Brännström, Alexanre Graell i Amat, an Petar Popovski Department of Signals an Systems,

More information

d 3 d 4 d d d d d d d d d d d 1 d d d d d d

d 3 d 4 d d d d d d d d d d d 1 d d d d d d Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching

More information

Fast Fractal Image Compression using PSO Based Optimization Techniques

Fast Fractal Image Compression using PSO Based Optimization Techniques Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

Network Topology Control and Routing under Interface Constraints by Link Evaluation

Network Topology Control and Routing under Interface Constraints by Link Evaluation Network Topology Control and Routing under Interface Constraints by Link Evaluation Mehdi Kalantari Phone: 301 405 8841, Email: mehkalan@eng.umd.edu Abhishek Kashyap Phone: 301 405 8843, Email: kashyap@eng.umd.edu

More information

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing Inexing the Eges A simple an yet efficient approach to high-imensional inexing Beng Chin Ooi Kian-Lee Tan Cui Yu Stephane Bressan Department of Computer Science National University of Singapore 3 Science

More information

WDM Network Provisioning

WDM Network Provisioning IO2654 Optical Networking WDM Network Provisioning Paolo Monti Optical Networks Lab (ONLab), Communication Systems Department (COS) http://web.it.kth.se/~pmonti/ Some of the material is taken from the

More information

Kinematic Analysis of a Family of 3R Manipulators

Kinematic Analysis of a Family of 3R Manipulators Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,

More information

EFFICIENT ON-LINE TESTING METHOD FOR A FLOATING-POINT ADDER

EFFICIENT ON-LINE TESTING METHOD FOR A FLOATING-POINT ADDER FFICINT ON-LIN TSTING MTHOD FOR A FLOATING-POINT ADDR A. Droz, M. Lobachev Department of Computer Systems, Oessa State Polytechnic University, Oessa, Ukraine Droz@ukr.net, Lobachev@ukr.net Abstract In

More information

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,

More information

PAPER. 1. Introduction

PAPER. 1. Introduction IEICE TRANS. COMMUN., VOL. E9x-B, No.8 AUGUST 2010 PAPER Integrating Overlay Protocols for Proviing Autonomic Services in Mobile A-hoc Networks Panagiotis Gouvas, IEICE Stuent member, Anastasios Zafeiropoulos,,

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM International Journal of Physics an Mathematical Sciences ISSN: 2277-2111 (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao

More information

A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks

A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks Wojciech Molisz, DSc, PhD Jacek Rak, PhD Gdansk University of Technology Department of Computer Communications

More information

WAVELENGTH-DIVISION multiplexed (WDM) optical

WAVELENGTH-DIVISION multiplexed (WDM) optical IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 9, NOVEMBER 2004 1823 A Dynamic Routing Algorithm With Load Balancing Heuristics for Restorable Connections in WDM Networks Lu Ruan, Member,

More information

Simple Layout Algorithms To Maintain Network Connectivity Under Faults

Simple Layout Algorithms To Maintain Network Connectivity Under Faults Simple Layout Algorithms To Maintain Network Connectivity Under Faults Galen H. Sasaki 1 Department of Electrical, University of Hawaii 2540 Dole Street, Honolulu, HI 96822 USA Ching-Fong Su and David

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

Design of Large-Scale Optical Networks Λ

Design of Large-Scale Optical Networks Λ Design of Large-Scale Optical Networks Λ Yufeng Xin, George N. Rouskas, Harry G. Perros Department of Computer Science, North Carolina State University, Raleigh NC 27695 E-mail: fyxin,rouskas,hpg@eos.ncsu.edu

More information

Toward the joint design of electronic and optical layer protection

Toward the joint design of electronic and optical layer protection Toward the joint design of electronic and optical layer protection Massachusetts Institute of Technology Slide 1 Slide 2 CHALLENGES: - SEAMLESS CONNECTIVITY - MULTI-MEDIA (FIBER,SATCOM,WIRELESS) - HETEROGENEOUS

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,

More information

Reformulation and Solution Algorithms for Absolute and Percentile Robust Shortest Path Problems

Reformulation and Solution Algorithms for Absolute and Percentile Robust Shortest Path Problems > REPLACE THIS LINE WITH YOUR PAPER IENTIFICATION NUMBER (OUBLE-CLICK HERE TO EIT) < 1 Reformulation an Solution Algorithms for Absolute an Percentile Robust Shortest Path Problems Xuesong Zhou, Member,

More information

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.

More information

Image compression predicated on recurrent iterated function systems

Image compression predicated on recurrent iterated function systems 2n International Conference on Mathematics & Statistics 16-19 June, 2008, Athens, Greece Image compression preicate on recurrent iterate function systems Chol-Hui Yun *, Metzler W. a an Barski M. a * Faculty

More information

Chalmers Publication Library

Chalmers Publication Library Chalmers Publication Library All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA This ocument has been ownloae from Chalmers Publication Library (CPL). It is the author s version of a work

More information

Arc Perturbation Algorithms for Optical Network Design

Arc Perturbation Algorithms for Optical Network Design Applied Mathematical Sciences, Vol. 1, 2007, no. 7, 301-310 Arc Perturbation Algorithms for Optical Network Design Zbigniew R. Bogdanowicz Armament Research, Development and Engineering Center Building

More information

Journal of Cybernetics and Informatics. Slovak Society for Cybernetics and Informatics

Journal of Cybernetics and Informatics. Slovak Society for Cybernetics and Informatics Journal of Cybernetics an Informatics publishe by Slovak Society for Cybernetics an Informatics Volume 13, 1 http://www.sski.sk/casopis/inex.php (home page) ISSN: 1336-4774 Journal of Cybernetics an Informatics

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

William S. Law. Erik K. Antonsson. Engineering Design Research Laboratory. California Institute of Technology. Abstract

William S. Law. Erik K. Antonsson. Engineering Design Research Laboratory. California Institute of Technology. Abstract Optimization Methos for Calculating Design Imprecision y William S. Law Eri K. Antonsson Engineering Design Research Laboratory Division of Engineering an Applie Science California Institute of Technology

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 0 0 0 0 0 0 0 0 on-uniform Sensor Deployment in Mobile Wireless Sensor etworks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University Boca Raton,

More information

Learning Subproblem Complexities in Distributed Branch and Bound

Learning Subproblem Complexities in Distributed Branch and Bound Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

Fuzzy Learning Variable Admittance Control for Human-Robot Cooperation

Fuzzy Learning Variable Admittance Control for Human-Robot Cooperation Fuzzy Learning ariable Amittance Control for Human-Robot Cooperation Fotios Dimeas an Nikos Aspragathos Abstract This paper presents a metho for variable amittance control in human-robot cooperation tasks,

More information

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural

More information

SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS

SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS D. Harle, S. Albarrak, F. Ali Department of Electrical and Electronic Engineering, University of Strathclyde, U. K {d.harle,sbarrak,

More information

New Geometric Interpretation and Analytic Solution for Quadrilateral Reconstruction

New Geometric Interpretation and Analytic Solution for Quadrilateral Reconstruction New Geometric Interpretation an Analytic Solution for uarilateral Reconstruction Joo-Haeng Lee Convergence Technology Research Lab ETRI Daejeon, 305 777, KOREA Abstract A new geometric framework, calle

More information

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory Feature Extraction an Rule Classification Algorithm of Digital Mammography base on Rough Set Theory Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative

More information

Optical Communications and Networking 朱祖勍. Nov. 27, 2017

Optical Communications and Networking 朱祖勍. Nov. 27, 2017 Optical Communications and Networking Nov. 27, 2017 1 What is a Core Network? A core network is the central part of a telecommunication network that provides services to customers who are connected by

More information

An Efficient Algorithm for Virtual-Wavelength-Path Routing Minimizing Average Number of Hops

An Efficient Algorithm for Virtual-Wavelength-Path Routing Minimizing Average Number of Hops An Efficient Algorithm for Virtual-Wavelength-Path Routing Minimizing Average Number of Hops Harsha V. Madhyastha Department of Computer Science and Engineering Indian Institute of Technology, Madras Chennai,

More information

A multiple wavelength unwrapping algorithm for digital fringe profilometry based on spatial shift estimation

A multiple wavelength unwrapping algorithm for digital fringe profilometry based on spatial shift estimation University of Wollongong Research Online Faculty of Engineering an Information Sciences - Papers: Part A Faculty of Engineering an Information Sciences 214 A multiple wavelength unwrapping algorithm for

More information

On the Feasibility and Efficacy of Protection Routing in IP Networks

On the Feasibility and Efficacy of Protection Routing in IP Networks University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering 2-0-2009 On the Feasibility an Efficacy of Protection Routing in IP Networks Kin-Wah

More information

Frequency Domain Parameter Estimation of a Synchronous Generator Using Bi-objective Genetic Algorithms

Frequency Domain Parameter Estimation of a Synchronous Generator Using Bi-objective Genetic Algorithms Proceeings of the 7th WSEAS International Conference on Simulation, Moelling an Optimization, Beijing, China, September 15-17, 2007 429 Frequenc Domain Parameter Estimation of a Snchronous Generator Using

More information

Genetic Fuzzy Logic Control Technique for a Mobile Robot Tracking a Moving Target

Genetic Fuzzy Logic Control Technique for a Mobile Robot Tracking a Moving Target .IJCSI.org 67 Genetic Fuzzy Logic Control Technique for a Mobile Robot Tracking a Moving Target Karim Benbouaballah an Zhu Qi-an College of Automation, Harbin Engineering University Harbin, 151, China

More information

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations

More information

Analysis and Algorithms for Partial Protection in Mesh Networks

Analysis and Algorithms for Partial Protection in Mesh Networks Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman MIT LIDS Cambridge, MA 02139 gregk@mit.edu Eytan Modiano MIT LIDS Cambridge, MA 02139 modiano@mit.edu Aradhana Narula-Tam MIT

More information

WDM Network Provisioning

WDM Network Provisioning IO2654 Optical Networking WDM Network Provisioning Paolo Monti Optical Networks Lab (ONLab), Communication Systems Department (COS) http://web.it.kth.se/~pmonti/ Some of the material is taken from the

More information

A Hierarchical P2PSIP Architecture to support Skype-like services

A Hierarchical P2PSIP Architecture to support Skype-like services A Hierarchical P2PSIP Architecture to support Skype-like services Isaias Martinez-Yelmo, Carmen Guerrero, Ruben Cuevas Departamento e Ingeniería Telemática Universia Carlos III e Mari Av. Universia 30.

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

Adjusted Probabilistic Packet Marking for IP Traceback

Adjusted Probabilistic Packet Marking for IP Traceback Ajuste Probabilistic Packet Marking for IP Traceback Tao Peng, Christopher Leckie, an Kotagiri Ramamohanarao 2 ARC Special Research Center for Ultra-Broaban Information Networks Department of Electrical

More information

Uninformed search methods

Uninformed search methods CS 1571 Introuction to AI Lecture 4 Uninforme search methos Milos Hauskrecht milos@cs.pitt.eu 539 Sennott Square Announcements Homework assignment 1 is out Due on Thursay, September 11, 014 before the

More information

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks Coorinating Distribute Algorithms for Feature Extraction Offloaing in Multi-Camera Visual Sensor Networks Emil Eriksson, György Dán, Viktoria Foor School of Electrical Engineering, KTH Royal Institute

More information

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks Hinawi Publishing Corporation International Journal of Distribute Sensor Networks Volume 2014, Article ID 936379, 17 pages http://x.oi.org/10.1155/2014/936379 Research Article REALFLOW: Reliable Real-Time

More information

Performance Modelling of Necklace Hypercubes

Performance Modelling of Necklace Hypercubes erformance Moelling of ecklace ypercubes. Meraji,,. arbazi-aza,, A. atooghy, IM chool of Computer cience & harif University of Technology, Tehran, Iran {meraji, patooghy}@ce.sharif.eu, aza@ipm.ir a Abstract

More information

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Dual Arm Robot Research Report

Dual Arm Robot Research Report Dual Arm Robot Research Report Analytical Inverse Kinematics Solution for Moularize Dual-Arm Robot With offset at shouler an wrist Motivation an Abstract Generally, an inustrial manipulator such as PUMA

More information

Interior Permanent Magnet Synchronous Motor (IPMSM) Adaptive Genetic Parameter Estimation

Interior Permanent Magnet Synchronous Motor (IPMSM) Adaptive Genetic Parameter Estimation Interior Permanent Magnet Synchronous Motor (IPMSM) Aaptive Genetic Parameter Estimation Java Rezaie, Mehi Gholami, Reza Firouzi, Tohi Alizaeh, Karim Salashoor Abstract - Interior permanent magnet synchronous

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

Rough Set Approach for Classification of Breast Cancer Mammogram Images

Rough Set Approach for Classification of Breast Cancer Mammogram Images Rough Set Approach for Classification of Breast Cancer Mammogram Images Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative Methos an Information Systems

More information

Distributed Clustering Method for Large-Scaled Wavelength Routed Networks

Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Yukinobu Fukushima Graduate School of Information Science and Technology, Osaka University - Yamadaoka, Suita, Osaka 60-08, Japan

More information

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach Nishi Sharma, Vanna Verma Abstract Wireless sensor networks (WSNs) is one of the emerging fiel of research in recent era

More information