Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Size: px
Start display at page:

Download "Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks"

Transcription

1 Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive, Piscataway, NJ 054, USA {jkang,jsucec,vkaul,ssamtani,mfecko}@research.telcoria.com Abstract Due to its banwith efficiency, multicast makes a group-centric communication more viable in wireless a hoc networks with limite raio resources. PIM-SM, a e facto stanar multicast protocol known for its high scalability, is a goo fit for a large-scale a hoc network. However, it oes not provie a robust multicast communication uner RP outage an high mobility. In this paper, we propose a robust way of configuring PIM-SM using Anycast RP in wireless a hoc networks. We analyze the impact of carinality an locations of anycast RPs on the network performance uner noe mobility. Base on these observations, we fin metrics for near-optimal carinality of anycast RPs an propose a novel RP selection scheme. The propose scheme is proven to make PIM-SM robust against noe mobility while satisfying QoS requirements an maintaining the scalability of PIM-SM. I. INTRODUCTION The banwith-efficient one-to-many communication paraigm of multicast is getting high attention as a way of group-centric communication in wireless a hoc networks eploye with scarce raio resources. Relatively unstable channel conition an ynamic topology changes from noe mobility, however, have been obstacles to its wie eployment. Many of the a hoc multicast protocols propose to overcome these problems still perform poorly in terms of message eliverability uner high mobility. This makes only variants of optimize flooing schemes feasible in that environment[]. On the other han, Protocol Inepenent Multicast-Sparse Moe (PIM-SM)[2] has been the e facto stanar in wie area networks ue to its scalability an QoS awareness[]. PIM-SM minimizes the multicast traffic by efficiently formulating the share tree using a central noe calle the Renezvous Point (RP) as the root of the tree. In PIM-SM, source noes in a multicast group sen their ata packets to the RP an then the RP natively multicasts them along the share multicast tree, which makes PIM-SM highly scalable with the growth of a multicast group membership. The high scalability of PIM-SM can significantly reuce the multicast traffic an control overhea of tree maintenance, This work has been prepare through collaborative participation in the Communications an Networks Consortium sponsore by the U.S. Army Research Laboratory uner the Collaborative Technology Alliance Program, Cooperative Agreement DAAD The U.S. Government is authorize to reprouce an istribute reprints for Government purposes notwithstaning any copyright notation thereon. Co-sponsore by the U.S. Army CERDEC uner the Proactive Integrate Link Selection for Network Robustness (PIL- SNER) program, contract W5P7T-04-CP022. Copyright c 200 Telcoria Technologies, Inc. All rights reserve. making it a promising solution in the wireless a hoc network with limite channel capacity. However, as inicate by [], existing wire multicast protocols incluing PIM-SM may fail to keep up with noe mobility an resulting route changes, thereby increasing protocol overheas. In aition, PIM-SM suffers from traffic concentration at the RP, consuming more energy in the vicinity noes of the RP an eventually making the RP unreachable from the rest of the network ue to energy epletion. The RP itself can fail, too. This RP outage problem cause by RP unreachability or failure makes the whole multicast communication break own, renering the RP a single point of failure. Robust multicast communication is a critical issue in the mobile a hoc network in which a wie range of military applications are often eploye. To enhance robustness of PIM-SM in the mobile a hoc network, we propose a PIM-SM configuration scheme that tackles two major aforementione issues, RP outage an noe mobility. To solve the RP outage problem, we eploy multiple active RPs in a multicast group using Anycast RP. Anycast RP has been alreay propose to cope with traffic concentration, slow convergence in case of RP failure, possible sub-optimal packet forwaring an istant RP epenencies, which are inuce by the single group-to-rp mapping property [4]. Anycast RP relaxes this single mapping constraint by configuring multiple RPs per group with an ientical anycast aress. While having more RPs per group brings benefits, it increases inter-rp traffic an control overhea among the RPs. Few stuies have been one to suggest an optimal number of anycast RPs. In this paper, we propose an incremental evaluation heuristic to fin a near-optimal number of anycast RPs that minimizes the multicast tree size while satisfying a certain level of robustness an QoS requirements. To solve the noe mobility problem of PIM-SM, the locations of anycast RPs are ecie base on the centroi concept. The topology change by noe mobility might results in the ineligibility of the current RP, thereby requiring RP relocation. RP relocation, however, incurs too much control overhea to inform the group members of the ientity of the new RP. Instea of frequent RP relocations, we show that if the level of noe mobility is not high, the noe mobility problem can be significantly mitigate by selecting anycast RPs base Anycast RP starting with a capital letter A inicates the PIM-SM mechanism using multiple RPs that are accesse base on the anycast routing protocol while anycast RP starting with a lowercase letter a implies an iniviual RP eploye in Anycast RP.

2 2 sener RP 0 receiver Region 0. RP RP - Region Region - an RP 0 natively multicasts them to the joine receivers in Region 0 an at the same time, RP 0 encapsulates an forwars the packets to the rest of the anycast RPs base on the MSDP protocol. The other anycast RPs ecapsulate the packets an natively multicast them to the receivers in their regions. If RP 0 fails, multicast packets from the sener are route to another topologically closest anycast RP, which reuces the RP outage perio. Fig.. Multicast communication with anycast RPs in the network on the centroi concept so that the topological central-ness of an anycast RP is not significantly hurt by noe mobility. This paper is organize as follows. In Section II, we provie the backgroun on Anycast RP as well as the previous work. In Section III, we present a mobility-robust RP selection scheme an a near-optimal carinality of anycast RPs. We stuy their performance in Section IV. Finally, we conclue our work in Section V. II. BACKGROUND A. Anycast RP vs. Multiple Domains Using multiple RPs for reliability or loa balancing is not a new iea. Earlier stuies take two ifferent approaches, provisioning multiple backup RPs or configuring a network into multiple omains. In the first approach, backup RPs are pre-etermine so that one of them can quickly replace the faile RP without incurring the RP election latency. However, a bootstrap mechanism is still require to map the logical multicast aress to the new physical RP aress. In this mechanism, the new group-to-rp mapping information nees to be flooe in the network before the new RP starts to operate, which still allows a temporary RP outage[5]. In aition, the new RP still suffers from congestion since only one RP is active at a given time. In the secon approach, a network is configure into several omains. A RP is selecte in each omain an the RPs in the network are inter-connecte by Multicast Source Discovery Protocol (MSDP)[]. The interconnecte RPs have ifferent IP aresses. This approach makes local communications efficient while achieving loa balancing among the RPs. But, the RP outage in one omain can still affect the whole multicast communication if a source noe belongs to the omain. When its RP fails, the source cannot irectly communicate with an RP in another omain since it is not aware of the RP s IP aress. As shown in Fig., Anycast RP allows an operator to configure multiple active RPs per group in the network using an ientical anycast aress. Therefore, there is logically one RP per group in the network. Group members join towars the topologically closest RP ecie by the unerlying unicast routing protocol. 2 We efine a region as a sub-network consisting of an anycast RP an the noes that are topologically closer to the anycast RP than any other anycast RPs. In the figure, a sener in Region 0 sens multicast packets to RP 0 2 An arrow in Fig. represents a multi-hop wireless communication. B. Previous Work A lot of research have been one in the literature for the optimal configuration of PIM-SM in wie area networks. Most of the work focus on selecting the RP in a single omain base on their own metrics an on relocating the RP in a istribute manner uner topology changes[5], [7]. Due to lack of space, the etails of the work are omitte in this paper. On the other han, the stanar of Anycast RP oes not specify the optimal carinality of anycast RPs an their locations[]. In [9], p-meian was use to fin multiple proxies in the overlay multicast architecture, but not in the Anycast RP environment. As far as we know, no previous work has been one to eal with the Anycast RP configuration that solves the noe mobility an RP outage problems. III. ROBUST PIM-SM CONFIGURATION In this section, we introuce two schemes to make Anycast RP robust against the noe mobility an RP outage problems. The noe mobility problem is alleviate by the mobility-robust RP selection metho. The RP outage problem is hanle by fining a near-optimal carinality of anycast RPs. In fact, these two problems are tightly couple as will be clear in the following subsections. A. Mobility-robust RP Selection In PIM-SM, the best way to trae off the banwith efficiency of share trees an the path length minimization of source-base shortest path trees is to overlap all shortest path trees an place a RP at the noe where the traffic from a source is split. But, this is not feasible since sources are sometimes not known a priori an can be istribute wiely across the network. On the other han, receivers are require to explicitly join a multicast group while any noe can sen ata to the multicast group. Therefore, given the network topology, our RP selection is performe base on the multicast group members, i.e., receivers. The goal of our RP selection scheme is to fin anycast RPs whose locations are robust against noe mobility. ) Mobility-robustness: Most of the RP selection schemes in the literature try to reuce the size of the multicast istribution tree so that multicast traffic in the network is minimize by sharing a large number of links. To minimize the network traffic, a group-share tree woul use a minimal spanning tree. When some subset of noes in a graph are connecte, this graph is calle a minimal Steiner tree an fining this tree is known to be NP-complete[0]. The anycast RP selection problem is a special case of the minimal Steiner tree problem

3 since the multicast tree topology is completely etermine by the locations of anycast RPs an the link metric use by the unerlying unicast routing, resulting in the union of RP-tomembers shortest paths. Therefore, the locations of anycast RPs shoul be carefully etermine to have a small tree size. The p-meian problem introuce in [] fins p noes whose aggregate istance to a set of noes in a graph is the smallest. The p-meian problem, which is known to be NP-complete, however cannot be irectly applie to our anycast RP selection problem since it oes not consier the inter-meian traffic. To select a mobility-robust RP, we reuce the p-meian problem into a simple -meian problem by applying p = an prove the chosen meian is robust to mobility as an anycast RP. Then, the -meian problem is extene to make multiple anycast RP selections in Section III-B. First, to fin a meian, the istance-sum of a noe v is efine as follows when V is the set of all noes. H(v) = u V (w(u) (v, u)), () where (v, u) is the shortest-path cost from noe v to u an w(u) is the weight function as in []. w(u) is if u is a multicast group member an 0 otherwise. The meian of a topology has the smallest istance sum. In the topology in Fig. 2(a), where black noes are multicast members an link weights are, noe is the meian with the smallest istancesum. There might be more than one meian in the network. Fining a meian from all noes is not scalable especially in a large-scale network. This involves calculating the istancesums of all noes, requiring O(nm) time complexity in an arbitrary graph with n noes an m group members. On the other han, fining a meian from the multicast group members introuces less time complexity, but it has been shown that a tree roote at a group member gives a elay boun of three times that of source-specific trees while the boun becomes two times that of source-specific trees if the root is locate near the center of the group[2]. Therefore, we create a shortest-path tree roote at a group member as shown in Fig. 2(b) (noe as a root in this case) in orer to fin the caniate RP set near the center of the multicast group. This tree is boun to inclue at least one meian since noes are connecte to the root on the shortest-path tree. Shortestpath trees roote at other group members are also create an a union set of all on-tree noes of the shortest-path trees is foun. We call this set an on-tree noe set. Then, the meian is foun from the on-tree noe set. This approach reuces time complexity compare to having all noes as a caniate RP set an minimizes path length compare to having multicast group members as a caniate RP set. In [], it is shown that a meian is equivalent to a centroi if the graph is a tree. If T v,, T v,2,..., T v,k are the connecte subtrees of a noe v of egree k in a tree T, the member size of a subtree T v,i is efine as follows: s(t v,i ) = w(u), (2) u T v,i We assume that the network is not partitione meian H()=5; H(4)=7; H(7)=7 Fig centroi M()=; M(4)=5; M(7)=5 (a) (b) (c) 9 H()=; H(4)=; H(7)= M()=; M(4)=5; M(7)= centroi H()=5; H(4)=7; H(0)=7 () (e) (f) Impact of mobility on the location of a meian where w(u) is the previously efine weight function. The maximum member size of a noe v is efine as M(v) = MAX i k s(t v,i ). () A noe v is calle a centroi if the noe has the smallest value of M(v). As Eq. inicates, the location of a centroi epens not on the path length between the centroi an the noes, but only on the noe weights. Fig. 2(c) shows a shortest-path tree roote at noe, which can be easily constructe from the topology in Fig. 2(a). Noe becomes a centroi since it has the smallest maximum member size. This is true for other shortest-path trees roote at other noes. In Fig. 2(), noe s movement within the centroi s subtree roote at noe 7 oes not affect the location of the centroi since noe s maximum member size is still the smallest after noe s movement as shown in Fig. 2(e). In Fig. 2(f), noe s istance sum is still the smallest after noe 9 s movement outsie the subtree. If a centroi is selecte from the multicast group members, noe 7 will be selecte in Fig. 2() an lose its role as a centroi after noe 9 s movement since noe 0 becomes a new centroi in the new topology in Fig. 2(f). Therefore, selecting a meian from the on-tree noe set as an anycast RP minimizes the impact of mobility while making the scheme scalable to the growth of network size. 2) Discussion: Uner high mobility, another on-tree noe can have a smaller maximum member size than that of the current centroi after noe movements. We believe this is a rare case uner moest mobility. Due to the shortest path unicast routing an limite raio range, the centroi will have a limite number of neighbor noes. The subtree roote at each of this neighbor noe will expan outwar from the centroi, making the istance to other subtrees large. As a result, the noe movements across these subtrees are expecte to be infrequent uner moest mobility. In aition, the noe mobility within a subtree will not change the maximum

4 4 member size of the current centroi even uner high mobility. B. Carinality of Anycast RPs To fin a near-optimal carinality of anycast RPs, we first quantify the impact of the carinality of anycast PRs on the QoS. The affecte QoS is measure by the average en-to-en path length of a connection an the inter-rp traffic volume. We choose these metrics because multicast is originally eploye for its banwith efficiency an often requires limit on the en-to-en path length especially for real-time applications. ) Impact on QoS: To analyze the average path length, we assume an Anycast RP network with uniformly istribute n noes an RPs as shown in Fig.. We assume the weight of each link is, making the average path length calculate in hops. We also assume that there is one multicast group with s sources an r receivers an they are uniformly istribute in the network. The multicast traffic in an Anycast RP network can be classifie into the intra-region traffic an the inter- RP traffic. With s sources an r receivers in each region r on the average, there are s intra-region source-to-receiver connections in the network. Therefore, the upper boun on the total number of hops 4 traverse by the intra-region traffic can be represente as s r 2H R, (4) where H R is the average hops from a noe towars its anycast RP in the network with RPs. H R will be shown later. On the other han, the total number of the inter-region sourceto-receiver connections is s ( ) r an the total number of hops traverse by these connections can be calculate as s ( ) r (2H R + H T ), (5) where H T is the average hops among anycast RPs in the network with uniformly istribute n noes. Therefore, the average source-to-receiver path length (in hops) of a connection is 2srH R + sr( ) (2H R + H T ) sr = 2H R + ( )H T. () H R an H T are epenent on the network topology. Base on the network connectivity moels in [], H R can be calculate as n α, where α ecies the network topology. We use the mesh network moel as a network topology in this paper. The average path length of a mesh network with uniformly istribute n noes is 2 n. Therefore, HT, which is the average path length between anycast RPs when the number of hops between ajacent RPs is n, can be calculate as 2 n. The proof of above calculations can be foun in []. With the values of H R an H T of a mesh network, Eq. becomes 2 n( + α ( )). (7) 4 This is the sum of the en-to-en elay represente in hops that each source-to-receiver connection experiences, not the size of the istribution tree in hops. Fig.. path length (in hops) number of RPs alpha = alpha = 2 alpha = alpha = 4 alpha = 5 alpha = Average path length of a connection in hops Number of RPs RP 2 RPs 4 RPs Source-base per group shortest-path tree Average hops (increase against (2%) (%) (-%) -RP case) TABLE I AVERAGE PATH LENGTH OF A CONNECTION BY SIMULATION In Fig., we plot Eq. 7 with ifferent α values an ifferent number of anycast RPs. It shows that as the number of anycast RPs increases, the average path length eventually ecreases, generating ifferent results epening on α values, i.e. ifferent network topologies. We also conuct simulations. We create 0 multicast groups with 0 seners an 20 receivers in each group in a ranom network with 0 noes. Simulations also have similar results shown in Table I. In the source-base shortest-path tree case in the table, receivers join each source irectly an as a result, the traffic from a source is forware to receivers without passing through a RP. Therefore, the istribution tree create by source-base shortest-path trees is topologically equivalent to the share tree with an anycast RP at each source, resulting in 0 RPs per group in our simulations. The above results clearly inicate that a certain level of RP reunancy is require not only for robustness but also for QoS requirements. While a large number of anycast RPs reuces path length, it increases the inter-rp communication overhea. Since the inter-rp multicast traffic is encapsulate in unicast packets an therefore cannot be share on the same link, it becomes a ominant component of the whole multicast traffic as the number of anycast RPs increases. In a mesh network with n noes, anycast RPs an source, the inter-rp traffic volume can be calculate as 2 n( ) Ts β, () where T s is the traffic volume of the source an β (> ) is the encapsulation overhea. The inter-rp multicast traffic in the network increases linearly with the carinality of anycast RPs while no inter-rp traffic is generate with a sole anycast RP, i.e., when =. Eq. can be euce from []. In aition to larger packet size an processing overhea ue to the encapsulation, anycast RPs nee to exchange MSDP control messages to route the encapsulate unicast ata packets

5 5 Inter-RP Communication Overhea 2... Average En-to-En Path length Fig. 4. Seconary metrics for carinality of anycast RPs Number of Anycast RPs en-to-en elay (ms) all noes on-tree noe set multicast group members among them. In the following section, we introuce the metrics for eciing the carinality of anycast RPs. 2) Metrics: We have two types of metrics to be use for eciing the carinality of anycast RPs: primary metric an seconary metrics. As mentione earlier, the primary goal of multicast is to reuce the size of the istribution tree to minimize the multicast traffic in the network. Therefore, our primary metric is the multicast traffic volume generate by the given Anycast RP configuration. In aition, we have a set of other application-specific metrics such as path length an inter-rp traffic. We call them seconary metrics. An Anycast RP configuration with a certain number of anycast RPs an their locations is evaluate an ranke by the primary metric only after it satisfies all of the seconary metrics. Fig. 4 shows two seconary metrics: inter-rp communication overhea an average en-to-en path length. As the carinality of anycast RPs increases, the inter-rp communication overhea increases while the average en-to-en path length ecreases as shown earlier. The application-specific seconary metrics are use for the pass-or-fail check. We assume that the boun for each seconary metric is specifie by the multicast group initiator. An Anycast RP configuration that satisfies all of the seconary metrics will further be evaluate base on the primary metric for the final selection. The caniate carinality of anycast RPs starts from two since a eployment with a sole RP oes not provie RP reunance an is ientical to the legacy PIM-SM. ) Heuristic: To fin a robust Anycast RP configuration with a near-optimal carinality of anycast RPs an their mobility-robust locations, we take an incremental evaluation approach that increases the number of anycast RPs in each step until that inclusion of an anycast RP satisfies all seconary metrics. The heuristic consists of the following steps. Step : Fin the on-tree noe set from the given topology an multicast group members. 5 Step 2: Calculate a istance-sum of each noe in the set an sort them in an ascening orer. Set the starting caniate carinality of anycast RPs to 2 (i.e., k = 2). Step : Pick k noes with the smallest istance-sum as anycast RPs. If there are more than one set of k noes ue to the same istance-sums, fin all possible sets of k noes. Step 4: Formulate a multicast istribution tree using k anycast RPs selecte in Step. Step 5: Evaluate the istribution tree base on the seconary metrics. 5 The network topology is available from the unerlying unicast routing protocol. In Section IV, OSPF is use. Fig En-to-en elay number of RPs Step : If not all of the seconary metrics are satisfie, go to Step with k = k +. Step 7: If all of the seconary metrics are satisfie, evaluate the istribution tree base on the primary metric. If there were more than one set of k noes in Step, compare their primary metric values an pick the best one. The k noes selecte in Step will provie mobilityrobustness as well as reunancy in case of RP failure. In the worst case when only one anycast RP survives, the RP is still robust to mobility ue to its small istance sum while forming a small-size istribution tree ue to its close proximity to the meian. The above heuristic fins the smallest carinality of anycast RPs that satisfies all seconary metrics impose by the eploye application. IV. EVALUATION Simulations to evaluate the effectiveness of the propose scheme are performe by using an embee evaluation functionality of our multicast planning tool calle PUMA (Planning Utility of Multicast Application). The network is compose of three OSPF areas an one backbone area. The area borer routers (ABR) in ifferent OSPF areas are connecte through the backbone area. A shortest path is ecie by the OSPF unicast routing protocol using the propagation elay as a link weight. There are 240 noes in the network. One multicast group is forme by ranomly selecting 0 members from each OSPF area (except the backbone area) with one source noe. There exist two types of wireless channels with the propagation elays of 20ms an 50ms, respectively. A noe s average number of neighbor noes is.9. In the first evaluation, we stuy the effectiveness of using the on-tree noe set an prove its near-optimality base on the weighte tree size an ento-en elay with no mobility. In the secon evaluation, we stuy the robustness of our RP selection heuristic against noe mobility. A. Carinality Fig. 5 an Fig. show the en-to-en elay an weighte tree size of the propose scheme with three RP caniate sets (i.e., from all noes, the on-tree noe set, or the multicast group members). As mentione in Section III-B2, the primary metric is the multicast traffic volume measure here base

6 Fig.. weighte tree size all noes on-tree noe set multicast group members Weighte tree size number of RPs During the low mobility perio, the propose scheme shows robustness to mobility by having comparable weighte tree sizes to those of the RP relocation case. This is because the maximum member sizes of the anycast RPs haven t change much uner moest mobility. As the mobility level increases, the chosen anycast RPs generate a larger multicast traffic volume. However, their increase traffic volume is still within 7% margin compare to the RP relocation scheme that might be provoke many times with large overhea uner high mobility. As the mobility level goes up, the weighte tree size is saturate in all cases because more number of noes begin to share the newly create istribution branches. Fig. 7. weighte tree size Propose scheme (5 RPs) RP relocation (5 RPs) Propose scheme (2 RPs) RP relocation (2 RPs) mobility Weighte tree size with respect to mobility V. CONCLUSION In this paper, we propose a robust Anycast RP configuration scheme that fins a near-optimal carinality of anycast RPs an their locations to hanle the RP outage an noe mobility problems. By eploying a near-optimal number of anycast RPs, we effectively reuce the RP outage perio while minimizing the inter-rp communication overhea. In aition to robustness, the selecte Anycast RP configuration enhances relevant metrics such as elay. We also etermine the locations of anycast RPs using the centroi concept to make them robust to the moest noe mobility, resulting in avoiance of frequent RP relocations that incur a lot of overhea. on the weighte tree size, in which the traffic volume is weighte by the link s weight. The en-to-en elay represents a seconary metric. The results of the anycast RP selection from the on-tree noe set are on a par with those of selecting from all noes while incurring low computation overhea. This is because the meians with the smallest istance sums are locate mostly in the on-tree noe set. On the other han, the meians selecte from the group members show low performance. When the upper boun on the en-to-en elay is set to 420ms, our scheme selects three anycast RPs that have almost the same weighte tree size as that of selecting anycast RPs from all noes with small computational overhea. B. Mobility The noe mobility can be implemente in two ways, by changing the velocity of a noe or by changing the percentage of mobile noes. In this paper, we change the fraction of mobile noes in the network. These noes move slowly enough not to make link breakages frequent. When a noe is connecte to a ifferent subnet after movement, a new istribution branch is quickly constructe by sening a JOIN message to the closest anycast RP. An anycast RP is always available to this noe by the anycast routing protocol. To evaluate the robustness of our RP selection scheme, we compare our scheme with the RP relocation scheme. The RP relocation scheme exhaustively searches the best set of anycast RPs base on the primary metric (i.e., the weighte tree size) after noe mobility. The RP relocation incurs the overheas mentione in Section II-A, which, however, is not inclue here. Due to lack of space, results of 2 an 5 RP cases are shown in Fig. 7. REFERENCES [] C. Coreiro, H. Gossain, an D. Agrawal, Multicast over Wireless Mobile A Hoc Networks: Present an Future Directions, IEEE Network, vol. 7, no., pp , Jan 200. [2] B. Fenner, M. Hanley, H. Holbrook, an I. Kouvelas, Protocol Inepenent Multicast - Sparse Moe (PIM-SM), RFC 40, Aug 200. [] C. Metz an M. Tatipamula, A Look at Native IPv Multicast, IEEE Internet Computing, vol., no. 4, pp. 4 5, Jul [4] D. Kim, D. Meyer, H. Kilmer, an D. Farinacci, Anycast Renevous Point (RP) mechanism using Protocol Inepenent Multicast (PIM) an Multicast Source Discovery Protocol (MSDP), RFC 44, Jan 200. [5] D. Estrin, M. Hanley, A. Helmy, an P. Huang, A Dynamic Boostrap Mechanism for Renezvous-base Multicast Routing, IEEE INFOCOM, Mar 999. [] B. Fenner an D. Meyer, Multicast Source Discovery Protocol (MSDP), RFC, Oct 200. [7] S.K.S. Gupta an P.K. Srimani, Aaptive Core Selection an Migration Metho for Multicast Routing in Mobile A Hoc Networks, IEEE Transactions on Parallel an Distribute Systems, vol. 4, no., pp. 27, Jan 200. [] D. Farinacci an Y. Cai, Anycast-RP Using Protocol Inepenent Multicast (PIM), RFC 40, Aug 200. [9] L. Lao, J.H. Cui, M. Gerla, an S. Chen, A Scalable Overlay Multicast Architecture for Large-Scale Applications, IEEE Transactions on Parallel an Distribute Systems, vol., no. 4, pp , Apr [0] M.R. Garey an D.S. Johnson, Computers an Intractability: A Guie to the Theory of NP-Completeness, New York: Freeman, Jun 9. [] O. Kariv an S.L. Hakim, An Algorithmic Approach to Network Location Problems. II: The p-meians, SIAM Journal of Applie Mathematics, vol. 7, no., pp , Dec 979. [2] D.W. Wall, Mechanisms for broacast an selective broacast, Ph.D. Thesis, Jun 90. [] National Institute of Stanars an Technology, Catalog of Network Connectivity Moel, netmoels.html, Apr 200. The views an conclusions containe in this ocument are those of the authors an shoul not be interprete as representing the official policies, either expresse or implie, of the Army Research Lab or the U.S. Government.

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

One-to-Many Multicast Restoration Based on Dynamic Core-Based Selection Algorithm in WDM Mesh Networks

One-to-Many Multicast Restoration Based on Dynamic Core-Based Selection Algorithm in WDM Mesh Networks Proceeings of the International MultiConference of Engineers an Computer Scientists 9 Vol I IMECS 9, March 18 -, 9, Hong Kong One-to-Many Multicast Restoration Base on Dynamic Core-Base Selection Algorithm

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,

More information

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:

More information

MODULE VII. Emerging Technologies

MODULE VII. Emerging Technologies MODULE VII Emerging Technologies Computer Networks an Internets -- Moule 7 1 Spring, 2014 Copyright 2014. All rights reserve. Topics Software Define Networking The Internet Of Things Other trens in networking

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University

More information

Network Working Group Request for Comments: 3446 Category: Informational H. Kilmer D. Farinacci Procket Networks January 2003

Network Working Group Request for Comments: 3446 Category: Informational H. Kilmer D. Farinacci Procket Networks January 2003 Network Working Group Request for Comments: 3446 Category: Informational D. Kim Verio D. Meyer H. Kilmer D. Farinacci Procket Networks January 2003 Status of this Memo Anycast Rendevous Point (RP) mechanism

More information

Multicast Routing : Computer Networking. Example Applications. Overview

Multicast Routing : Computer Networking. Example Applications. Overview Multicast outing 5-744: Computer Networking Unicast: one source to one estination Multicast: one source to many estinations Two main functions: Efficient ata istribution Logical naming of a group L-0 Multicast

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Additional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication

Additional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Aitional Divie an Conquer Algorithms Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Divie an Conquer Closest Pair Let s revisit the closest pair problem. Last

More information

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance International Journal of Moern Communication Technologies & Research (IJMCTR) Impact of FTP Application file size an TCP Variants on MANET Protocols Performance Abelmuti Ahme Abbasher Ali, Dr.Amin Babkir

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Lab work #8. Congestion control

Lab work #8. Congestion control TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 0 0 0 0 0 0 0 0 on-uniform Sensor Deployment in Mobile Wireless Sensor etworks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University Boca Raton,

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

2-connected graphs with small 2-connected dominating sets

2-connected graphs with small 2-connected dominating sets 2-connecte graphs with small 2-connecte ominating sets Yair Caro, Raphael Yuster 1 Department of Mathematics, University of Haifa at Oranim, Tivon 36006, Israel Abstract Let G be a 2-connecte graph. A

More information

On the Placement of Internet Taps in Wireless Neighborhood Networks

On the Placement of Internet Taps in Wireless Neighborhood Networks 1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that

More information

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,

More information

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

Supporting Fully Adaptive Routing in InfiniBand Networks

Supporting Fully Adaptive Routing in InfiniBand Networks XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar

More information

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,

More information

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita

More information

Ad-Hoc Networks Beyond Unit Disk Graphs

Ad-Hoc Networks Beyond Unit Disk Graphs A-Hoc Networks Beyon Unit Disk Graphs Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich 8092 Zurich, Switzerlan {kuhn, wattenhofer, zollinger}@inf.ethz.ch ABSTRACT

More information

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks Hinawi Publishing Corporation International Journal of Distribute Sensor Networks Volume 2014, Article ID 936379, 17 pages http://x.oi.org/10.1155/2014/936379 Research Article REALFLOW: Reliable Real-Time

More information

PAPER. 1. Introduction

PAPER. 1. Introduction IEICE TRANS. COMMUN., VOL. E9x-B, No.8 AUGUST 2010 PAPER Integrating Overlay Protocols for Proviing Autonomic Services in Mobile A-hoc Networks Panagiotis Gouvas, IEICE Stuent member, Anastasios Zafeiropoulos,,

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Enhancement of the CBT Multicast Routing Protocol

Enhancement of the CBT Multicast Routing Protocol Enhancement of the CBT Multicast Routing Protocol Seok Joo Koh and Shin Gak Kang Protocol Engineering Center, ETRI, Korea E-mail: sjkoh@pec.etri.re.kr Abstract In this paper, we propose a simple practical

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT

More information

Overview : Computer Networking. IEEE MAC Protocol: CSMA/CA Internet mobility TCP over noisy links

Overview : Computer Networking. IEEE MAC Protocol: CSMA/CA Internet mobility TCP over noisy links Overview 15-441 15-441: Computer Networking 15-641 Lecture 24: Wireless Eric Anerson Fall 2014 www.cs.cmu.eu/~prs/15-441-f14 Internet mobility TCP over noisy links Link layer challenges an WiFi Cellular

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

Image Segmentation using K-means clustering and Thresholding

Image Segmentation using K-means clustering and Thresholding Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,

More information

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks Provisioning Virtualize Clou Services in IP/MPLS-over-EON Networks Pan Yi an Byrav Ramamurthy Department of Computer Science an Engineering, University of Nebraska-Lincoln Lincoln, Nebraska 68588 USA Email:

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

Learning Subproblem Complexities in Distributed Branch and Bound

Learning Subproblem Complexities in Distributed Branch and Bound Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach Nishi Sharma, Vanna Verma Abstract Wireless sensor networks (WSNs) is one of the emerging fiel of research in recent era

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stolyar Abstract Backpressure-base aaptive routing

More information

1 Surprises in high dimensions

1 Surprises in high dimensions 1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic

More information

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which

More information

Routing in Ad-hoc Networks

Routing in Ad-hoc Networks 0/3/ COMP 635: WIRELESS & MOILE COMMUNICTIONS Routing in d-hoc Networks Jasleen Kaur Fall 0 Infrastructure-less Wireless Networks Standard Mobile IP needs an infrastructure Ø Home gent/foreign gent in

More information

ASM. Engineering Workshops

ASM. Engineering Workshops 1 ASM 2 ASM Allows SPTs and RPTs RP: Matches senders with receivers Provides network source discovery Typically uses RPT to bootstrap SPT RPs can be learned via: Static configuration recommended Anycast-RP

More information

Fast Fractal Image Compression using PSO Based Optimization Techniques

Fast Fractal Image Compression using PSO Based Optimization Techniques Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting

More information

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA Preprint, August 5, 2018. 1 All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA Mikhail Ivanov, Frerik Brännström, Alexanre Graell i Amat, an Petar Popovski Department of Signals an Systems,

More information

Optimal Distributed P2P Streaming under Node Degree Bounds

Optimal Distributed P2P Streaming under Node Degree Bounds Optimal Distribute P2P Streaming uner Noe Degree Bouns Shaoquan Zhang, Ziyu Shao, Minghua Chen, an Libin Jiang Department of Information Engineering, The Chinese University of Hong Kong Department of EECS,

More information

A Stochastic Process on the Hypercube with Applications to Peer to Peer Networks

A Stochastic Process on the Hypercube with Applications to Peer to Peer Networks A Stochastic Process on the Hypercube with Applications to Peer to Peer Networs [Extene Abstract] Micah Aler Department of Computer Science, University of Massachusetts, Amherst, MA 0003 460, USA micah@cs.umass.eu

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

Optimal Oblivious Path Selection on the Mesh

Optimal Oblivious Path Selection on the Mesh Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract

More information

Keywords-MANETs, Multicast mode, Clustering, Inter-domain routing.

Keywords-MANETs, Multicast mode, Clustering, Inter-domain routing. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Survey of Multicast

More information

Routing and quality of service support for mobile ad hoc networks

Routing and quality of service support for mobile ad hoc networks Computer Networks 51 (2007) 3142 3156 www.elsevier.com/locate/comnet Routing an quality of service support for mobile a hoc networks Anelise Munaretto a,c, *, Mauro Fonseca b,c a CPGEI/UTFPR, Programa

More information

d 3 d 4 d d d d d d d d d d d 1 d d d d d d

d 3 d 4 d d d d d d d d d d d 1 d d d d d d Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks Optimal Routing an Scheuling for Deterministic Delay Tolerant Networks Davi Hay Dipartimento i Elettronica olitecnico i Torino, Italy Email: hay@tlc.polito.it aolo Giaccone Dipartimento i Elettronica olitecnico

More information

Kinematic Analysis of a Family of 3R Manipulators

Kinematic Analysis of a Family of 3R Manipulators Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stoylar arxiv:15.4984v1 [cs.ni] 27 May 21 Abstract

More information

Enabling Rollback Support in IT Change Management Systems

Enabling Rollback Support in IT Change Management Systems Enabling Rollback Support in IT Change Management Systems Guilherme Sperb Machao, Fábio Fabian Daitx, Weverton Luis a Costa Coreiro, Cristiano Bonato Both, Luciano Paschoal Gaspary, Lisanro Zambeneetti

More information

Topics. Computer Networks and Internets -- Module 5 2 Spring, Copyright All rights reserved.

Topics. Computer Networks and Internets -- Module 5 2 Spring, Copyright All rights reserved. Topics Internet concept an architecture Internet aressing Internet Protocol packets (atagrams) Datagram forwaring Aress resolution Error reporting mechanism Configuration Network aress translation Computer

More information

A Hierarchical P2PSIP Architecture to support Skype-like services

A Hierarchical P2PSIP Architecture to support Skype-like services A Hierarchical P2PSIP Architecture to support Skype-like services Isaias Martinez-Yelmo, Carmen Guerrero, Ruben Cuevas Departamento e Ingeniería Telemática Universia Carlos III e Mari Av. Universia 30.

More information

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.

More information

Chalmers Publication Library

Chalmers Publication Library Chalmers Publication Library All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA This ocument has been ownloae from Chalmers Publication Library (CPL). It is the author s version of a work

More information

On the Feasibility and Efficacy of Protection Routing in IP Networks

On the Feasibility and Efficacy of Protection Routing in IP Networks University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering 2-0-2009 On the Feasibility an Efficacy of Protection Routing in IP Networks Kin-Wah

More information

Interior Permanent Magnet Synchronous Motor (IPMSM) Adaptive Genetic Parameter Estimation

Interior Permanent Magnet Synchronous Motor (IPMSM) Adaptive Genetic Parameter Estimation Interior Permanent Magnet Synchronous Motor (IPMSM) Aaptive Genetic Parameter Estimation Java Rezaie, Mehi Gholami, Reza Firouzi, Tohi Alizaeh, Karim Salashoor Abstract - Interior permanent magnet synchronous

More information

Financial Services Design for High Availability

Financial Services Design for High Availability Financial Services Design for High Availability Version History Version Number Date Notes 1 March 28, 2003 This document was created. This document describes the best practice for building a multicast

More information

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie

More information

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting

More information

Adjusted Probabilistic Packet Marking for IP Traceback

Adjusted Probabilistic Packet Marking for IP Traceback Ajuste Probabilistic Packet Marking for IP Traceback Tao Peng, Christopher Leckie, an Kotagiri Ramamohanarao 2 ARC Special Research Center for Ultra-Broaban Information Networks Department of Electrical

More information

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients Probabilistic Meium Access Control for 1 Full-Duplex Networks with Half-Duplex Clients arxiv:1608.08729v1 [cs.ni] 31 Aug 2016 Shih-Ying Chen, Ting-Feng Huang, Kate Ching-Ju Lin, Member, IEEE, Y.-W. Peter

More information

Divide-and-Conquer Algorithms

Divide-and-Conquer Algorithms Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:

More information

Distributed Conditional Multicast Access for IP TV in High-Speed Wireless Networks (Destination Specific Multicast)

Distributed Conditional Multicast Access for IP TV in High-Speed Wireless Networks (Destination Specific Multicast) 137 Distributed Conditional Multicast Access for IP TV in High-Speed Wireless Networks (Destination Specific Multicast) 1, 2 Jan Fesl, 1 Richard Klee, 1 Marie Dolezalova 1 Institute of Applied Informatics,

More information

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali

More information

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure

More information

0607 CAMBRIDGE INTERNATIONAL MATHEMATICS

0607 CAMBRIDGE INTERNATIONAL MATHEMATICS CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Seconary Eucation MARK SCHEME for the May/June 03 series 0607 CAMBRIDGE INTERNATIONAL MATHEMATICS 0607/4 Paper 4 (Extene), maximum

More information

Top-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications

Top-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications Top-own Connectivity Policy Framework for Mobile Peer-to-Peer Applications Otso Kassinen Mika Ylianttila Junzhao Sun Jussi Ala-Kurikka MeiaTeam Department of Electrical an Information Engineering University

More information

0607 CAMBRIDGE INTERNATIONAL MATHEMATICS

0607 CAMBRIDGE INTERNATIONAL MATHEMATICS PAPA CAMBRIDGE CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Seconary Eucation MARK SCHEME for the May/June 0 series CAMBRIDGE INTERNATIONAL MATHEMATICS /4 4 (Extene), maximum

More information

Cooperative Data Dissemination to Mission Sites

Cooperative Data Dissemination to Mission Sites Cooperative Data Dissemination to Mission Sites Fangfei Chen a, Matthew P. Johnson b, Amotz Bar-Noy b and Thomas F. La Porta a a Department of Computer Science and Engineering, the Pennsylvania State University

More information

Learning convex bodies is hard

Learning convex bodies is hard Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples

More information

Optimizing the quality of scalable video streams on P2P Networks

Optimizing the quality of scalable video streams on P2P Networks Optimizing the quality of scalable vieo streams on PP Networks Paper #7 ASTRACT The volume of multimeia ata, incluing vieo, serve through Peer-to-Peer (PP) networks is growing rapily Unfortunately, high

More information

TCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model

TCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model TCP Symbiosis: Congestion Control Mechanisms of TCP base on Lotka-Volterra Competition Moel Go Hasegawa Cybermeia Center Osaka University 1-3, Machikaneyama-cho, Toyonaka, Osaka 56-43, JAPAN Email: hasegawa@cmc.osaka-u.ac.jp

More information

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks Coorinating Distribute Algorithms for Feature Extraction Offloaing in Multi-Camera Visual Sensor Networks Emil Eriksson, György Dán, Viktoria Foor School of Electrical Engineering, KTH Royal Institute

More information

MODULE V. Internetworking: Concepts, Addressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, And End-To-End Services

MODULE V. Internetworking: Concepts, Addressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, And End-To-End Services MODULE V Internetworking: Concepts, Aressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, An En-To-En Services Computer Networks an Internets -- Moule 5 1 Spring, 2014 Copyright

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information