Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking

Size: px
Start display at page:

Download "Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking"

Transcription

1 1 Self-Orgnizing Hierrchicl Routing for Sclble Ad Hoc Networking Shu Du Ahmed Khn Sntshil PlChudhuri Ansley Post Amit Kumr Sh Peter Druschel Dvid B. Johnson Rudolf Riedi Rice University Abstrct As devices with wireless networking become more pervsive, mobile d hoc networks re becoming incresingly importnt, motivting the development of highly sclble d hoc networking techniques. In this pper, we present the design nd evlution of novel protocol for sclble routing in d hoc networks s prt of the Sfri project. We develop probbilistic, self-orgnizing network hierrchy formtion protocol tht recursively forms the nodes of the d hoc network into n dptive, proximity-bsed hierrchy of cells. We develop hybrid routing protocol tht uses this hierrchy nd lso develop n ondemnd rective routing protocol to scle to lrge numbers of nodes. The mpping of unique node identifiers to hierrchicl ddresses is done using distributed hsh tble tht leverges the hierrchicl network structure. We evlute this sclble routing protocol through nlysis nd simultions, showing individully s well s together the performnce of the hierrchy formtion protocol, the overhed of ddress mpping, nd the performnce of the routing protocol. As devices with wireless networking become more pervsive, mobile d hoc networks re becoming incresingly importnt, motivting the development of highly sclble d hoc networking techniques. In this pper, we present the design nd evlution of novel protocol for sclble routing in d hoc networks s prt of the Sfri project. We develop probbilistic, self-orgnizing network hierrchy formtion protocol tht recursively forms the nodes of the d hoc network into n dptive, proximity-bsed hierrchy of cells. We develop hybrid routing protocol tht uses this hierrchy nd lso develop n on-demnd rective routing protocol to scle to lrge numbers of nodes. The mpping of unique node identifiers to hierrchicl ddresses is done using distributed hsh tble tht leverges the hierrchicl network structure. We evlute this sclble routing protocol through nlysis nd simultions, showing individully s well s together the performnce of the hierrchy formtion protocol, the overhed of ddress mpping, nd the performnce of the routing protocol. I. INTRODUCTION Ad hoc networking is n ttrctive technology for providing wireless internet ccess nd other wireless communictions services for mobile users, but current d hoc network routing protocols re limited in sclbility. In n d hoc network, individul mobile nodes cooperte to form network without the id of ny existing communictions infrstructure such s bse sttions or ccess points. Insted, ech mobile node cts not only s host but lso s router, forwrding pckets for other mobile nodes to llow nodes beyond direct wireless trnsmission rnge of ech other to communicte. With the rpid prolifertion of wireless devices, the use of d hoc networking is likely to grow, nd with it, the size of d hoc networks tht my be creted. At the sme time, the field of peer-to-peer, or decentrlized, self-orgnizing distributed systems hs seen significnt interest nd dvnces in recent yers nd hs opened new lterntives in providing services in lrge-scle networked systems. Work on these two res hs proceeded lrgely independently. The Sfri project is developing protocols nd lgorithms for providing lrge-scle mobile wireless network connectivity nd bsic network services, exploiting tight integrtion between d hoc networking nd peer-to-peer networking. In this pper, we present the design nd evlution of new self-orgnizing hierrchicl routing protocol for sclble d hoc networking, s prt of the Sfri project. The routing protocol is bsed on probbilistic, self-orgnizing network hierrchy formtion protocol tht recursively forms the nodes of the d hoc network into n dptive, proximitybsed hierrchy of cells. Routing of pckets is guided by this hierrchy nd by on-demnd rective routing, forming hybrid routing protocol cpble of scling to lrge numbers of nodes. The mpping of unique node identifiers to hierrchicl ddresses is done using distributed hsh tble tht leverge the hierrchicl network structure. We evlute our routing protocol through both nlysis nd simultions, showing the performnce of the hierrchy formtion protocol, the overhed of ddress mpping, nd the performnce of the routing protocol. Our evlution ddresses incresing size of the network in number of nodes, incresing mobility in the frction of nodes tht re mobile vs. sttionry, nd incresing trffic lod in number of dt pcket flows. Our nlysis is well mtched by our simultions, nd our results demonstrte the protocol s sclbility. In Section II of this pper, we describe the detils of the Sfri protocol rchitecture, including its self-orgniztion, routing, nd ddress resolution components. In Section III we present our modeling nd nlysis of Sfri, nd present our detiled, simultion bsed, performnce evlution in Section IV. In Section V, we discuss relted work in the re of sclble d hoc networking, nd conclude in Section VI. II. SAFARI ARCHITECTURE In this section, we provide high-level overview of the bsic Sfri rchitecture, nd then present the vrious components of Sfri routing in more detil. A. Overview Sfri is hybrid, hierrchicl routing protocol, using both proctive nd rective routing components. The hierrchy is formed s recursive orgniztion of nodes into cells, cells into supercells, nd so on, bsed on n utomtic self-selection of subset of the nodes to operte s drums. In generl, level k cells re grouped into level k + 1 cells, nd for simplicity, we refer to individul nodes s level 0 cells. We cll level 1 cells

2 2 lso fundmentl cells, s t this level, the cell is composed only of individul nodes. The drums re orgnized hierrchiclly, s well, with subset of the individul nodes self-selecting to become level 1 drums, nd itertively level k drums self-selecting to become level k + 1drums.Alevelk drum is t the sme time lso level i drum for ll i k. Ech drum hs unique identifier, nd ech drum t level i identifies cell t level i. The drum selection is bsed on distributed lgorithm thus requiring no centrlized coordintion. Nodes of the sme level re roughly eqully spced (in terms of hop counts) throughout the totl d hoc network. The drum identifiers crete hierrchicl ddress for ech node. Ech drum dissemintes loclity, hierrchy, nd routing informtion by trnsmitting periodic becon pckets, which re forwrded by ll nodes within well-defined scope in the network. A becon hop count nd n identifier for the originting drum provides nodes with sense for their loction within the network, which they store in the network using distributed hsh tble (DHT); crefully choosing multiple storge nodes improves robustness nd efficiency of lookup. The drums do not hve ny specil role in dt pcket forwrding; they simply provide sense of loction nd direction tht is used in routing. For sending dt pcket, the pcket is routed ccording to the hierrchicl ddress (or coordintes) of the pcket s source nd destintion, recursively routing towrds the drum for the destintion node s cell t ech level. To route towrds drum, Sfri normlly follows the reverse pth of the most recent becon from tht drum. Once the dt pcket is received by ny node within the destintion s fundmentl cell, tht node initites n on demnd route discovery for the trget node (if it does not lredy hve previous cched route) to complete the route. This ensures tht dt pckets do not hve to go through drums. This ensures tht drums re no more loded with dt pckets thn norml nodes. Locl route repir llows Sfri to overcome route filures in n on-demnd mnner nd reduces the need for more frequent becons; routing stte for drum is followed by dt pckets until new stte is recreted by lter becon. We now provide more detiled description of the components of the Sfri rchitecture The Sfri rchitecture owes its sclbility to the following fetures of the rchitecture: Trnsprency: Becons mintin hierrchy, keep loclity informtion up to dte, nd provide crucil routing informtion mtched to the loclity informtion. Hybrid routing: Proctive, hierrchicl routing for routing towrds the fundmentl cell of the destintion, where route discovery is costly, combines idelly with ondemnd routing for the lst mile, i.e., the fundmentl cell where owing to node mobility, proctive mintennce of precise loction becomes costly. Distributed solutions: Shred responsibilities, distribution of loclity informtion, nd self-selection reduce stress on individul nodes nd void overhed from voting, electing, nd coordinting. We now provide the design detils left unspecified so fr nd in prticulr, we ddress the issues of efficiency nd Fig. 1. Beconing scope A X Level i cell B Level i+1 cell sclbility. The three protocols tht provide the bsics for the Sfri rchitecture re s follows: self orgniztion, sclble routing, nddistributed ddress resolution. Further elements of the Sfri rchitecture which provide higher level services re beyond the scope of this pper. B. Self orgniztion In this section, we describe the lgorithms tht chieve nd mintin the desired hierrchicl orgniztion of the network, even under node mobility, node filures, nd prtition nd merging of networks. There re three bsic mechnisms which llow the Sfri rchitecture to self orgnize. 1) Beconing protocol: Ech drum periodiclly brodcsts n dvertisement of its existence long with some useful informtion. Such control pcket from drum of level n is clled level n becon. Ech becon contins the following informtion: 1) becon sequence number, 2) becon level nd coordinte which equl those of the emitting drum, 3) nd hop count which is set to zero t the emitting drum nd incremented by ech forwrding node. Adrumtleveln trnsmits becon of level n every T n seconds. These becons re forwrded by ll nodes within D n number of hops from tht drum. This forwrding rule llows becons to rech ll nodes tht could potentilly ssocite with the originting drum ccording to the Membership lgorithm described in Section II-B.3. For exmple in Figure 1, the dotted circle denotes ll nodes within D i hops of X, leveli drum. Higher level becons re emitted t lower frequency thn lower level becons. This is becuse mobile nodes cross over the regions covered by lower level drums more frequently thn they cross over the regions covered by higher level drums. For sclbility, T n nd D n re given by the geometric progressions: D n = α D n 1 = α n 1 D 1 ; T n = β T n 1 = β n 1 T 1 (1) where α > 1ndβ > 1 re system prmeters. D 1 is bsed on the optiml hop count tht the on demnd routing protocol, used t the level of the fundmentl cell, cn hndle efficiently. To increse the efficiency of sclble routing (Section II-C), becon of level n is lso forwrded by ll nodes in the level n + 1 cell of the originting drum. The exct mechnism by which cell structure is formed is discussed in Section II-B.3. For node X in Figure 1, the becons re forwrded throughout the level i + 1 cell of which X is member. The forwrding

3 3 of becons is hence union of the two forwrding rules mentioned bove. All nodes store the becons they forwrd in cche of becons, clled the Drum Ad Hoc Routing tble (DART). This cche is used for self-orgniztion s well s routing. In ddition to mintining ll the vribles contined in becon, node lso stores in its DART the time of reception of the becon nd the node identifier from which it received the becon in the DART. The ltter will llow following of the reverse pth of the becon, while the former llows to keep the cche up to dte. Upon receipt of becon, new DART entry is formed nd timer for tht entry is strted. Whenever new entry is inserted into the DART or DART entry expires, the drum level selection nd the Membership lgorithms re invoked. As mentioned erlier, the only specil function of drum is to originte becons. A drum hs no specil or ctive role in routing or in the overly mintennce. In prticulr, dt pckets re only routed towrds but not through drums, s will be described in Section II-C. Thus, ll nodes shre the becon trnsmission worklod (origintion or forwrding) eqully. 2) Drum level selection lgorithm: In order to be efficient under dynmic chnges of the network such s mobility nd node filures, new drums cn form nd existing drums cn retire. This lgorithm runs fter ech chnge in the DART nd ssures tht eventully the DART stisfies the following conditions. For node of level n: 1) the DART contins t lest one non-expired becon of leveln + 1drumtmostD n+1 hops wy, 2) there is no non-expired becon of level n drum less thn h D n hops wy (0 < h < 1 is hysteresis fctor), 3) there re t lest two non-expired becons of t lest level n 1. The wy by which the desired stte of the DART is chieved is by chnging the node s level ppropritely such tht the invrints re met. If condition 1 is violted, the level of the node is chnged to n + 1 nd the node wits rndom bck-off time until it nnounces its new level with its level n + 1 becon. This does not pply to the highest level drum; otherwise, the highest level drum would increse its level indefinitely. A drum infers tht it is the highest level drum if its DART does not hve non-expired becons from drum of its level. If condition 2 is violted, it mens tht two or more drums of the sme level re too close to ech other. The drum with the highest node identifier remins t the sme level, nd the rest of the drums reduce their level by 1. The fctor h cretes hysteresis which prevents oscilltions in the drum retirement process. By oscilltion, we men n unstble sitution of retirements of drums nd formtion of new drums to compenste for the retirement, leding to new retirements, nd this process continuing unendingly. Indeed, level n drum retiring could cuse condition 1 to be violted for other nerby nodes which then will increse its level. However, these nodes will be t lest D n hops wy from ny level n drum. Since conflict between drums requires this distnce to reduce to h D n < D n there is no oscilltion. For the rest of the pper, we chose h = 1/2. Condition 3 is for efficiency nd ensures tht ny drum in the Sfri tree hs more thn one brnch hnging off it. 3) Membership lgorithm: The presence of drums induces nturl clustering of nodes. Ech node ssocites with drum of level one greter thn its own level, nd selects this drum ccording to the contents of its DART. Typiclly, node ssocites with the one higher level drum tht is the lest number of hops wy. A node s ssocition is mde individully nd is not communicted bck to the drum. A node invokes the membership lgorithm fter it hs run the drum level selection lgorithm. In its bsic version, for node of level n, this lgorithm chooses the closest of ll drums of level n + 1 for which this node hs DART entry tht hs not expired. However, this might led to nodes ner the cell border to oscillte between drums. In order to prevent such oscilltions this rule to chnge the ssocited drum is enhnced by ssigning ech DART entry weight clculted from the frequency, the distnce, nd the number of becons received. The node ssocites with the drum corresponding to the DART entry with the highest weight. In our design presented in this pper, we enforce tht the new drum is t lest 2 hops closer thn the current one, nd tht t lest 3 becons hve been received from the new drum. The membership lgorithm cnnot ensure tht the node ssocites with drum tht is t most D n hops wy. This is the duty of the drum level selection lgorithm. Coordinte selection: The membership lgorithm gives unique ncestry for ech node. Using this membership informtion, ech node is ssigned coordinte bsed on the drum structure. This coordinte plys vitl role in routing. The Sfri hierrchicl tree structure fosters simple scheme to provide coordintes by trnsferring the loclity informtion encoded in the tree. Every node in the network is ssigned coordinte. The coordinte of drum t level i is the conctention of the coordinteof the level i+ 1 drum with which it ssocites nd rndomly generted unique number. Thus, if COORD(D i ) denotes the coordinte of level i drum, D i nd PARENT(D i ) denotes the level i+1 drum with which node (not necessrily drum) ssocites, then we hve the following COORD(D i )=COORD(PARENT(D i )).RAND(b) where RAND(b) denotes uniform rndom number of b bits. With lrge vlue of b the probbility tht two drums t the sme level will chose the sme rndom number cn be mde negligible. The coordinte of lef node L, isgivenby COORD(L)=COORD(PARENT(L)) When node powers on, it ssocites with drum t level 1 nd sets its coordinte to the coordinte of the drum with which it ssocites. This implies tht ll nodes in fundmentl cell hve the sme coordinte. Suppose drum D i t level i hs the coordinte [D k D k 1 D i D i 1 D 1 ] nd decides to decrese its level from being drum t level i to drum t level i 1. Suppose fter doing so it ssocites with nother drum t level i, B i, which hs the coordinte [B k B k 1 B i B i 1 B 1 ]. Then the drum tht decresed its level will be drum t level i 1 nd

4 4 its coordinte will be [B k B k 1 B i D i 1 D 1 ]. On the other hnd if drum D i t level i hs the coordinte [D k D k 1 D i+1 D i D 1 ] nd decides to increse its level to drum t level i + 1 then it chooses uniform rndom number D i+1 nd sets its coordinte to be [D kd k 1 D i+1 D i D 1 ]. However, before chnging its coordintes, the drum listens for becons from other drums t level i + 1 in order to check for collisions. If there is collision then the node picks nother uniform rndom number insted of D i+1 nd uses tht insted. The level n becon scope is extended beyond the TTL D n to the cell of level n + 1 in order to improve on the efficiency of routing nd self-orgniztion. To this end, becon of level n is forwrded by node unless the n + 1 coordinte of the node nd the becon re different. This limits the scope of the becon flood. 4) Discussion: The beconing protocol requires notion of cells nd coordintes to determine the becon scope; the membership lgorithm in turn relies on becons to compute the hierrchy nd coordinte. To clrify the sitution let us mention tht the becon scope is t lest certin number of hops, the becon TTL. This will ssure proper functioning of the lgorithms even with temporrily dysfunctionl cell structure. The becon scope is widened to the next upper cell for efficiency in routing nd not for correctness of the protocol. At strt up, nodes hve n empty coordinte nd will forwrd every becon. If no becon is received for timeout period, node will increse its level to become drum. The becons of the first few drums will rech throughout the network. Once t lest two of them hve incresed their levels to become level 2 drum will the level 1 becon scope be confined by the cell structure. When two Sfri d hoc networks merge, i.e., when nodes of two Sfri networks with tree depth n nd m n overher ech other s becons then these becons re not stopped immeditely nd penetrte the other network. The level k becons with k m, in prticulr, re forwrded throughout both Sfri networks for the simple reson tht either the becon or the forwrding node hs only m coordintes nd thus cnnot differ in the k+1 coordinte. The smller network quickly lerns of the high level drum in the other network, nd ssocites with it, updting its coordintes in the process. This corresponds to merging smller tree t the pproprite level into the lrger tree. If the depths hppen to be equl, one will increse its level to become the new root, s discussed previously. C. Sclble routing protocol Routing in the Sfri hierrchicl rchitecture cn be divided into two phses. Given the hierrchicl ddress of the destintion node, the first phse, clled inter-cell routing, isto deliver the pcket to the fundmentl cell where the destintion node lies in. Once the pcket reches the fundmentl cell of the destintion, the second phse, clled intr-cell routing, will deliver the pcket to the destintion node within tht fundmentl cell. Inter-cell routing is bsed on the destintion s hierrchicl ddress nd the becon records stored in the DART of the intermedite forwrding nodes. We ssume the existence of bidirectionl wireless links, which is true for the commonly used protocol in the MAC lyer. With this ssumption, the inter-cell routing cn be supported by following the reverse pths of the becons emitted by the drums of the cells where the destintion node belongs to. For intr-cell routing, ny stte of the rt on-demnd routing protocols cn be used, since the size of the fundmentl cell is within their cpbility. We choose DSR s the intr-cell routing protocol for its proved stbility with high performnce in smll scle d hoc networks [1]. When source node S with coordinte [S n S n 1 S 1 ], hs pcket to send to node D, S retrieves the coordinte [D n D n 1 D 1 ] of D using the DHT ddress lookup service described in Section II-D, We clim tht there must exist n integer k,1 k n, such tht S i = D i for ll k i n, wheren is the number of levels in the hierrchy. If k = 1, then S nd D belong to the sme fundmentl cell nd intr-cell routing is invoked. Otherwise, inter-cell routing is invoked. If inter-cell routing is pplied, the source S will ttch the coordinte of D into the pcket heder before sending it out so tht the following downstrem nodes cn get the coordinte of the destintion from the pcket insted of hving to do seprte DHT lookup. When node hs pcket to forwrd, it will use the sme logic s the source to see whether to keep on doing the inter-cell routing or to pply intr-cell routing. Let s look t n exmple. In Figure 2, it shows how pcket is sent from the source node S to the destintion node D. S uses inter-cell routing first, long the route lbeled by nd b, to rech the fundmentl cell of destintion node D. Within the fundmentl cell, intr-cell routing is used to deliver the pcket to the destintion, long the route lbeled by c. The route mrked with is the reverse pth of the becon emitted by the level 2 drum A, whichd belongs to, while the route mrked with b is the reverse pth of the becon emitted by the level 1 drum B, which D is directly ssocite with Fig. 2. S b b Sfri routing overview 1) Proctive strtegy in inter-cell routing: The bsic strtegy of the inter-cell routing is to tke the reverse pth of the becons tht were herd previously. When becon is received, the node stores the immedite upstrem node s b b b A b c D c B

5 5 identifier in its DART (long with the informtion contined in the becon). When the node hs dt pcket to send to the specific cell, it cn uses this stored informtion to get the next hop towrd tht cell. As illustrted in Figure 1, ech drum emits its becon to ll the nodes in its own cell s well s the nodes in the cells of its siblings (the sme level drums which lso shre the sme higher level drum). This mechnism gurntees tht ny node tht is in the sme super-cell will hve the routing informtion to ll the fundmentl cells in this super-cell in the sense tht it cn reverse the becon pth. Unlike some clustered routing protocols in d hoc network, which ssumes the existence of super powered cluster heds, drums in the sfri hierrchicl structure need not be prt of the route tken for dt trnsmission. As we cn see in Figure 2, once the pcket enters the level 2 cell of A, ny node in tht cell will hve the routing informtion to the fundmentl cell B nd the pcket will not go through the drum A. For inter-cell routing, ech pcket contins the following informtion in its heder, till the pcket reches the fundmentl cell of the destintion: Length:Theprefix mtch length between the destintion s coordinte nd the entry in the DART tht ws used to forwrd this pcket. We define the prefix mtch length between two coordintes [B n B n 1 B 1 ] nd [C n C n 1 C 1 ] s the lrgest integer k such tht B i = C i ; n i < n k. Sequence number: The sequence number of the becon corresponding to the entry in the DART tht ws used for forwrding this pcket. In order to forwrd dt pcket for destintion, node does the following: 1) The node serches its DART to find out the entry with the mximum prefix mtch length with the destintion s coordinte 2) If the entry with the mximum prefix mtch length hs prefix mtch length > Length contined in the pcket, then the node updtes the vlues of Length nd Sequence number ccording to the entry in the DART. The pcket is then forwrded to the hop from which the becon corresponding to the entry in the DART ws received. 3) If the mximum prefix mtch length is equl to the Length contined in the pcket, then if ny such entry hs corresponding becon sequence number which is no less thn the Sequence number crried in the pcket, then use tht DART entry to forwrd the pcket fter updting the Sequence number in the pcket. 4) If the mximum prefix mtch length (over ll entries in the DART) is less thn the Length contined in the pcket, then the node invokes locl route repir s described below. Inter-cell routing is loop free, becuse for ny given time, every node will hve only one unique pth to the destintion. The DART entries give the reverse pths of the becons, which re lwys trees nd hence loop-free. The pths trversed by pckets cn be considered s being composed of brnch segments from different trees. When pcket is delivered towrds drum, the pcket lwys trvels upwrd towrds the root long the brnches of the corresponding tree, which is obviously loop free. And once the pcket jumps to nother tree, it mens tht the prefix mtch length increses, the pcket will never jump bck to the previous trees since the forwrding lgorithm requires tht the node trversl cn only be from shorter prefix length to longer prefix length. Therefore, the entire trversed pth is loop free. 2) Rective strtegy in inter-cell routing: The inter-cell routing scheme s described bove requires the node forwrding the pcket to follow the reverse pth of the drum becons. But this might not be possible in the following circumstnces: When node received pcket which follows the reverse pth of some specific drum s becon, the corresponding becon entry t the node my hve lredy expired. Also, due to prtitions in the network or due to the unrelible wireless medi, some becons might not rech their intended scope. As result of these, node ttempting to forwrd pcket might not hve ny useful informtion in its DART. When forwrding node tries to send the pcket to the next hop, the trnsmission could fil due to the mobility of nodes or the flky conditions of the wireless medium,. This filure cn be notified by its own MAC lyer if the MAC protocols uses request nd cknowledge mechnism, similr to the MAC protocol. Compred with the previous cse, this sitution is much more frequent in wireless networks nd cn potentilly degrde routing performnce substntilly. If such situtions rise, triggered by filed serch in the BART or by n unsuccessful trnsmission, Locl Route Repir is invoked in the forwrding node. Locl route repir is used to find n lternte route to keep on forwrding the pckets. The node sends out ROUTE REQUEST pcket to its round neighborhood within hop-limited rnge fter the node buffers the pckets which could not be delivered. The ROUTE REQUEST pcket contins the following dditionl informtion: 1) the current mximum prefix length mtch in the node s DART 2) the sequence number for the becon being followed 3) the coordinte of the unrechble finl destintion A node receiving the ROUTE REQUEST serches its DART for the coordinte of the destintion. If the node finds longer prefix mtch for the destintion coordinte or if the node finds sme length prefix mtch but with higher sequence number, the node sends ROUTE REPLY contining the mtching DART entry, bck to the origintor of the ROUTE REQUEST. If node receiving ROUTE REQUEST cnnot reply to the request nd if the request is not duplicte of n erlier received request, the node rebrodcsts the ROUTE REQUEST. Once the ROUTE REPLY goes bck to the requester, the previously buffered pckets will be redirect through the pth the ROUTE REPLY just trversed. A node receiving multiple ROUTE REPLY pckets chooses the ROUTE REPLY with the longest prefix mtch. If two replies hve the sme length prefix mtch, the node ccepts the reply from the closer responder.

6 6 3) Rective intr-cell routing: When n intermedite node receives pcket, it checks if itself is in the sme fundmentl cell s the destintion, i.e. its coordinte mtches with the coordinte of the destintion. If the coordintes mtch, then the pcket hs reched the fundmentl cell of the destintion nd intr-cell routing is used to send the pcket to the destintion. While ny d hoc network routing protocol cn be used within the fundmentl cell, we choose to use DSR [2] s it is fully rective protocol which hs been shown to perform well [1]. DSR is source routing protocol, i.e. ech pcket sent using DSR contins source route. The DSR protocol consists of two mechnisms: Route Discovery nd Route Mintennce. To perform Route Discovery for destintion node D, source node S brodcsts ROUTE REQUEST tht gets flooded through the network in controlled mnner. This request is nswered by ROUTE REPLY from either D or some other node tht knows route to D. To reduce frequency nd propgtion of ROUTE REQUESTs ech node ggressively cches source routes tht the node lerns or overhers. Route Mintennce detects when some link over which dt pcket is being trnsmitted breks. When such route brekge is detected, ROUTE ERROR is sent to S. Upon receiving ROUTE ERROR, S cn use ny other route to D tht it hs in its route cche, or S cn initite new Route Discovery for D. In trditionl DSR, ROUTE REQUEST my be flooded throughout the entire network, thus mking Route Discovery incresingly expensive with the increse in network size. Since in our cse of intr-cell routing, it is lredy known tht the destintion exists in the sme fundmentl cell, the Route Discovery is limited to the dimeter of the fundmentl cell. As different fundmentl cells my hve different sizes, the Route Discovery rnge is bsed on the dynmic membership of the nodes, insted of predefined hop count. Specificlly, whenever node received Route Discovery messge, it compres it s own coordinte with the inititor s coordinte. The node then forwrds the pcket only if the two coordintes mtch. This technique is sclble, s the fundmentl cell size does not increse with the network size. The origintor A my hve the wrong coordinte of the destintion B, s B might hve chnged it s membership recently. To tke dvntge of the high probbility of the destintion still remining in the vicinity of it s previous fundmentl cell, hop count threshold is introduced in the Route Discovery phse which llow the ROUTE REQUEST pckets to go few hops beyond the fundmentl cell. In this modified Route Discovery, ech node forwrding ROUTE REQUEST checks if its own coordinte is different from tht of the origintor of the ROUTE REQUEST nd if so, increments the hop count field in the pcket. If the hop count is lower thn threshold, then the request is forwrded, else it is dropped. This cretes fuzzy boundry of cell llowing routing with lesser overhed. D. Address resolution The routing protocol described in Section II-C delivers pckets to the intended destintion given tht destintion s current coordinte, which depends on its current loction in the network. However, typiclly senders wish to ddress pckets using the destintion s permnent identifier. To enble this, distributed ddress resolution service mps node s identifier to its current coordinte. Clerly, n pproprite service must be sclble, efficient, nd tolernt of node filures nd mobility. In ddition, to stisfying the needs of d hoc wireless environments, it must observe loclity, such tht lookup of nerby node does not require communiction with distnt node. The service is implemented in mnner tht is similr to distributed hsh tble (DHT) but is dpted to the needs of mobile d hoc environment. A conventionl distributed hsh tble stores key,vlue pirs by hshing the key nd storing the ssocited tuple t set of overly nodes whose unique identifiers re closest to the resulting hsh vlue. However, unlike n overly-bsed DHT, our service directly exploits the hierrchicl structure provided by the buoy protocol. Therefore it does not incur dditionl mintennce overhed. Also, the spce of node coordintes, s opposed to the spce of node identifiers s in overly-bsed DHTs, is interpreted s the DHT s identifier spce. Finlly, our service inserts replics of ech tuple in loclity-wre fshion, to stisfy the needs of n d hoc network environment. Ech node inserts the tuple (IP ddress, coordinte) t set of k nodes throughout the network where k is the repliction fctor. The set k is determined by hshing the node s identifier k times, nd choosing the nodes whose present coordintes re closest to ech of the hsh vlues. The node reinserts the tuple whenever its coordinte chnges, or when given refresh intervl hs pssed. Any node cn lookup the coordinte of nother node by hshing the node s identifier nd sending query towrds one of the resulting coordintes. With pproprite choices for k nd the refresh intervl, this scheme provides relible ddress resolution despite the movement nd filure of nodes. This bsic scheme is similr to the one used in lndmrk routing [3]. Unfortuntely, the bsic scheme does not stisfy the loclity requirements of n d hoc network, since looking up node requires communiction with node tht my be distnt in the network. Similrly, updting node s coordinte requires communiction with k nodes with rbitrry loctions in the entire network. To preserve loclity, we ugment the bsic scheme s follows. In ddition to inserting tuples t the k rndom coordintes, we insert the tuple lso t k nodes closest to the node s present coordinte, with the i lest significnt coordinte components replced by the rndom hsh vlue, for i rnging from 1 to the number of levels in the buoy cell hierrchy minus 1. Thus, we store tuples t nodes tht re incresingly closer to the node s present position in the network. Moreover, when node A s coordinte chnges only in the i lest significnt components, it needs to reinsert its tuple only t nodes whose distnce is proportionl to i, thus reducing the cost of mobility. Thus, remote communiction is only required when node moves cross high-level cell boundry. Coordintes stored t greter distnce my be inccurte in the lest significnt components s result of this technique,

7 7 but the correct coordinte cn be determined by itertively checking the closer tuples during lookup. When node A looks up node B s coordintes, it proceeds by itertively querying nodes t greter distnce from A, usingthe sme technique of coordinte prefix substitution. The mximl distnce tht query hs to trvel is now relted to the present distnce between node A nd node B in the network, thus reducing the cost of lookups. In ddition, ech node in the system cches the coordinte of node it hs recently looked up or otherwise lernt. This cching reduces the lod on the lookup service nd reduces the totl pcket trnsmission ltency in the common cse. We will present n experimentl evlution of the lookup service in Section IV-B. 1) Fult tolernce: It is likely tht one of the nodes storing coordinte fils or becomes unrechble. This is countercted by replicting the tuple t different hsh loctions s described erlier. The use of good hsh function distributes these replics widely through the network, thus reducing the likelihood of tuples becoming unvilble. In ddition, ech node tht stores tuple lso brodcsts tht tuple for its neighbors to store. This llows prticulr tuple to remin vilble even if the originl node storing it hs filed or deprted. Despite these mesures, it is possible node s coordinte becomes unvilble due to series of node filures or movements. To minimize the probbility of such loss, ech node periodiclly refreshes its coordinte. The refresh period should be more frequent for tuples stored close to the node nd less frequent for distnt tuples nd is chosen dynmiclly ccording to the observed chrcteristics nd stbility (node mobility nd churn) of the network. III. MODELS AND ANALYSIS This section proposes nd vlidtes the models tht we hve used to chrcterize the drum protocol nd the control overhed in the Sfri rchitecture. A. RSA model for drum formtion The Rndom Sequentil Adsorption (RSA) [4] model which is encountered in the description of moleculr dsorption processes lets us estimte the number of drums tht form, by the time the drum protocol hs converged. A one dimensionl version of the RSA model ws studied by Renyi [5] nd is populrly clled the cr prking problem. Consider street of length L. Crs of unit length rrive t rndom points in the street nd ttempt to prk t tht point. A cr prks if the lredy prked crs llow enough room t tht loction for it to prk. It leves otherwise. This process continues until no empty spot of t lest unit length remins. The prking process is sid to hve reched the jmming limit. The frction of street spce occupied by the crs is clled the pcking density. Renyi mthemticlly showed tht the verge pcking density t the jmming limit is 74.75% [5]. Only experimentl results re vilble for higher dimensionl cses (e.g. Hyperspheres prking in hypervolumes). The verge pcking density of the RSA process of circles prking on plne (2-D RSA) is 54.7% [6]. A limit theorem of Coffmn et l. [7] ensures tht the verge vlue of the pcking density converges when the prking hypervolume becomes lrge. In the following sections we consider d hoc networks of nodes in two dimensionl spce nd use the 2-D RSA model of discs. 1) The instntneous propgtion pproximtion: Consider two nodes A nd B, within D 1 hops of ech other, which just powered ON nd re witing to her from level 1 drums. The nodes wit for rndom time, uniformly distributed between [T min,t mx ], before turning into level 1 drums if necessry. Let T be the time for pcket to trverse D 1 hops. If T mx T min T then, with high probbility, one of the nodes will her becon from the other node before deciding to become drum nd so will not become drum. Therefore with high probbility, level 1 drums re seprted by t lest D 1 hops. The instntneous propgtion ssumption sttes tht level 1 drums re seprted by t lest D 1 hops, with high probbility. Extending the rgument to ll levels, level i drums re seprted by t lest D i hops, with high probbility. 2) Drum formtion conforms to the RSA model: Under the instntneous propgtion pproximtion, ll level 1 drums re t distnce of t lest D 1 hops. Thus, fictitious discs of rdii D 1 /2 hops centered t the drums do not overlp. This cn be thought of s nodes ttempting to prk. A node ttempts to prk disc of rdius D 1 /2 hops when its witing timer expires. A prking ttempt succeeds if the disc does not collide with n existing disc nd fils otherwise. A filure is equivlent to node finding level 1 drum within D 1 hops before its witing timer expires nd hence deciding not to become drum. The drum formtion process will proceed s long s disc cn prk without colliding nd when it completes no more discs cn be plced. This is becuse if it were indeed possible to plce disc t node without conflicts then tht node is t lest distnce of D 1 hops from every level 1 drum nd hence will hve tendency to become drum itself. If n is the verge number of level 1 drums tht form, then using the fct tht the prking density t the jmming limit is 54.7% we find n = N (2) π D2 1 4 ρ where N is the number of nodes in the network. ρ is the node density in the hop metric sense, its vlue depending on the trnsmission rnge of the rdio signl nd the sptil density of nodes. From simultions, we estimted vlue of ρ to be 1.4 for node density of 10 per rdio rnge nd rdio rnge of 250 meters. The bove eqution expresses tht the fictitious discs round the drums cover 54.7% of the nodes. The plot in Figure 3 ws obtined by simulting the drum protocol in ns-2 for 100 seconds with 500 nodes. The mobility model is modified billirds bll model with rndom reflection ngle upon hitting simultion surfce edges. Node speeds re uniformly distributed between 5 nd 15m/s. The plot shows the number of level 1 drums per node (n/n) t 100s, t which time the drum formtion process is complete. The witer timer expires uniformly in [0,150s]. Hence the instntneous pproximtion holds. The simultion shows tht the RSA model successfully predicts the number of drums tht form fter convergence of the drum protocol.

8 8 Fig. 3. Number of level 1 buoys per node Theoreticl Simultion D 1 Number of level 1 drums: ns-2 simultion For higher level drums the prking problem becomes constrined prking problem ( level 2 drum should lso be level 1 drum). The prking substrte (lower level drums) does not look like continuum to the higher level drum formtion process. The pproprite model is the RSA- RS (RSA-Rndom Sites) [8]. The model effectively reduces the pcking density little. From Eqution 2 the following eqution holds: n i = α i ( D i+1 ) 2 (3) n i+1 D i where n i is the number of level i drums nd α i is the rtio of the verge pcking densities of the RSA-RS process ssocited with level i drums nd the level i + 1drums.Since the pcking density decreses with the level slightly, α i is lrger thn but close to unity. B. Collision model for drum retirement When two level n drums drift to within h D n /2 hops of ech other, one of them will retire. We cn think of this s collision of two fictitious discs of rdii h D n /2 hops. We cn use results from sttisticl physics of moleculr collisions to compute the frequency of retirements [9]. Adpting the theory for two dimensionl discs we obtin the number of level n drum retirements per second in the network to be AD n v verge ρ 2 2 (4) where v verge is the verge velocity of the nodes, A is the re covered by the network nd ρ is the sptil density of level n drums. Using the RSA model results to substitute for ρ, the bove expression simplifies in functionl form to (N 2 /AD 3 n ) which is Θ(1/D 3 n) level n drum retirements per second per unit re (see Eqution 8). Thus the stbility of the drums increses with the level of the drums. Drum formtion rte t equilibrium is the sme s Eqution 4 if we ssume firly stble popultion of drums when equilibrium hs been reched. C. Overhed chrcteriztion This section chrcterizes some of the control overhed by using the models previously described. 1) Drum flooding overhed: Eqution 3 sys tht for every level i + 1 drum there re α i (D i+1 /D i ) 2 level i drums where α i is proportionlity fctor which is close to unity. Consider network with L levels (L is O(logN)) of drum hierrchy. Let the level i drum emit drum pckets once every T i seconds. A level i drum brodcst reches ll the nodes in the next higher level (level i + 1) cell. So node will receive drum pckets from ll level i drums which re within the sme level i + 1 cell which contins this node (α i (D i+1 /D i ) 2 of them) for i running from 1 to L 1 nd from the highest level drum. Therefore, overhed due to drum floods X drum,definedby the number of pcket forwrded per second per node is: X drum α 1 D 2 2 D T 1 +α 2 D 2 3 D α L 1 T 2 D 2 L D 2 L 1 1 T L T L (5) The ctul overhed due to drum floods is little greter thn tht shown in the bove eqution becuse becon floods propgte minimum number of hops (D i ). Therefore level i drum s pckets rech some nodes of neighboring level i+1 cell (like A in Figure 1) if the drum is t the border of the level i + 1 cell. But the error in Eqution 5 is negligible. This is becuse such overhering nodes live t the border of the cell nd hence re fr fewer thn interior nodes (like B in Figure 1) of cell. Moreover such node will her leked pcket only once for every, order of, (D i+1 /D i ) 2 brodcsts from its own level i + 1 cell. D i s nd T i s re geometriclly incresing s shown by Eqution 1. Hence, Eqution 5 implies tht X drum = Θ(1). 2) Frequency of cell chnges for node: A node s coordinte could chnge if the node moves into new cell. Since the verge interspcing (in hops) between two level i + 1drums is proportionl to D i+1, if the verge velocity of the level i drum node is v, it will cross the boundry of its level i+1 cell in time proportionl to D i+1 /v. In prticulr the frequency with which node moves over to n djcent fundmentl cell is proportionl to v/d 1. Totl number of coordinte chnges due to cell crossover Liner fit Simultion /D 1 1 Fig. 4. Level 1 cell crossing frequency follows D1 lw Figure 4 shows the result of n ns-2 simultion. The simultion is run for 100 seconds. The dt during the first 25 seconds ws discrded to remove initil trnsient behvior. The x-xis is the inverse of D 1 nd the y-xis is the totl number of coordinte chnges for ll 500 nodes due to level 1 cell crossings of the nodes. It is seen tht the number of

9 9 coordinte chnges due to level 1 cell crossings follows 1/D 1 lw. 3) DHT control overhed chrcteriztion: Nodes updte the DHT on-demnd when their coordintes chnge. Below we nlyze the overhed in the three circumstnces tht cn cuse node to chnge its coordinte: Cse 1: A level i drum crosses the boundry of its level i + 1 cell, in which cse the coordintes of ll the nodes which re ssocited with this drum chnge in the (i + 1)th digit from the lst. In prticulr, if non-drum node ( level 0 drum) moves into new fundmentl cell within the sme level 2 cell, its coordintes lst digit will chnge. As ws concluded in the previous section, node s coordintes ith digit from the lst, chnges with frequency of β(1/d i ) times per second for some constnt β which is independent of the D i s. If node s coordinte chnges beginning t the ith digit from the lst, it updtes its coordinte t ll its loctor nodes (nodes tht store its coordinte) which re in the sme level i+1 cell s this node is (loclity of updtes condition). Those re the m loctor nodes whose coordintes differ from this node s coordinte in the lst digit only, long with the m loctors whose coordintes differ from this node s coordinte in the lst two digits only nd so on until level i (for simplicity we ssume m = 1 in the reminder of this section). However, the verge hop distnce of loctor node whose coordinte is obtined by hshing nd replcing ll but the lst j digits with the coordinte digits of the node in question is proportionl to D j+1, becuse such node could be nywhere in the level j + 1 cell whose dimeter is of the order of D j+1 hops. Therefore bout D j+1 nodes re involved in forwrding the DHT updte to tht loctor node. Therefore the DHT updte overhed mesured in pckets/node/second generted due to nodes chnging their i th level drum is proportionl to (D D i+1 ) 1 = 1 i+1 D j (6) D i D i The totl overhed is obtined by summing up the bove for ll levels. Hence if we denote by X DHT 1 the overhed per node per second through DHT updtes triggered by mechnism I, then L 1 X DHT 1 = i=1 α i D i i+1 j=2 j=2 D j (7) where α i s re constnts independent of the D i s. If we choose D i s to be geometriclly incresing then the bove sum is 0(L) where L = 0(log(N)). Cse 2: If drum retires, then nodes in the vicinity will chnge their coordinte. Consider two drums of levels i nd j. Assume m = min(i, j). If these two drums come within D m /2 hops of ech other one of them will retire. This will led to some nodes chnging their coordintes nd updting them in the DHT. More specificlly the coordintes will chnge in their mth digit from the lst digit becuse level m drum hs retired. The number of such nodes chnging their coordintes is proportionl to the cell size of the level m cell which is in turn proportionl to D 2 m, s inferred from Eqution 2. These nodes will updte the DHT by updting their loctor nodes nd will therefore give rise to n updte overhed. The frequency with which retirement of level m drums hppens is described by the collision model. From Eqution 4, the totl number of collisions per unit re per second between level m drums is proportionl to D m ρ 2 m,whereρ m is the sptil density of level m drums. By collision, we men two drums drifting so close s to led to retirement of one of them. But ρ m = n m /A where A is the re of the network nd n m is the totl number of level m drums in the network. But from the RSA model described previously, n m is proportionl to N/D 2 m where N is the totl number of nodes in the network. Therefore, the totl number of collisions per second in the network between level m drums is proportionl to AD m ρ 2 m = AD n 2 m m A 2 D m N 2 A D 4 = N2 m AD 3 (8) m But ech collision is going to led to order of D 2 m nodes chnging their coordintes. But these coordinte chnges re occurring in the mth digit from the lst nd hence they incur forwrding overhed proportionl to (D D m+1 ). Therefore the per second node pcket product ssocited with the DHT updte overhed due to level m drum retirements is proportionl to N 2 AD 3 m D 2 m (D D m+1 ) (9) Hence the per node pcket overhed per second is 1/N th of the bove nd simplifies to N α m (D D m+1 ) (10) AD m where α m is constnt of proportionlity which is independent of the D i s. We sum up the bove expression over the drum levels to obtin the totl overhed. If we denote by X DHT 2 the overhed due to mechnism II in pckets per node per second, then X DHT 2 = L 1 m=1 α m ρ D L D m+1 = D m i=1 i+1 β i D i j=2 D j (11) where ρ is the sptil density of nodes mesured in nodes per squre meter nd α m s re proportionlity constnts independent of the D i s. It is remrkble tht X DHT 2 hs the sme form s X DHT 1 nd hence is 0(log(N)). Tht is, the overhed incurred by drum retirements nd cell crossovers re of the sme functionl form. Cse 3: If new drum forms, then nodes in the vicinity will chnge their coordinte. Under equilibrium conditions the drum popultion t ny level i fluctutes bout men vlue. Thus roughly speking for every level i drum retiring new level i drum ppers. Thus the retirement rte is equl to the formtion rte t equilibrium. But for every level i drum ppering the number of nodes tht will experience chnge in the coordinte in the ith digit is proportionl to D 2 i, the order of the size of level i cell. These nodes will updte the loctor nodes. Therefore by rguing exctly s we rgued for the previous cse, we rrive t the sme expression for the per node per second pcket overhed

LECT-10, S-1 FP2P08, Javed I.

LECT-10, S-1 FP2P08, Javed I. A Course on Foundtions of Peer-to-Peer Systems & Applictions LECT-10, S-1 CS /799 Foundtion of Peer-to-Peer Applictions & Systems Kent Stte University Dept. of Computer Science www.cs.kent.edu/~jved/clss-p2p08

More information

CS 268: IP Multicast Routing

CS 268: IP Multicast Routing Motivtion CS 268: IP Multicst Routing Ion Stoic April 5, 2004 Mny pplictions requires one-to-mny communiction - E.g., video/udio conferencing, news dissemintion, file updtes, etc. Using unicst to replicte

More information

Looking up objects in Pastry

Looking up objects in Pastry Review: Pstry routing tbles 0 1 2 3 4 7 8 9 b c d e f 0 1 2 3 4 7 8 9 b c d e f 0 1 2 3 4 7 8 9 b c d e f 0 2 3 4 7 8 9 b c d e f Row0 Row 1 Row 2 Row 3 Routing tble of node with ID i =1fc s - For ech

More information

Network Interconnection: Bridging CS 571 Fall Kenneth L. Calvert All rights reserved

Network Interconnection: Bridging CS 571 Fall Kenneth L. Calvert All rights reserved Network Interconnection: Bridging CS 57 Fll 6 6 Kenneth L. Clvert All rights reserved The Prolem We know how to uild (rodcst) LANs Wnt to connect severl LANs together to overcome scling limits Recll: speed

More information

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases Overview Mobile computing nd dtbses Generl issues in mobile dt mngement Dt dissemintion Dt consistency Loction dependent queries Interfces Detils of brodcst disks thlis klfigopoulos Network rchitecture

More information

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,

More information

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1.

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1. Answer on Question #5692, Physics, Optics Stte slient fetures of single slit Frunhofer diffrction pttern. The slit is verticl nd illuminted by point source. Also, obtin n expression for intensity distribution

More information

A Priority-based Distributed Call Admission Protocol for Multi-hop Wireless Ad hoc Networks

A Priority-based Distributed Call Admission Protocol for Multi-hop Wireless Ad hoc Networks A Priority-bsed Distributed Cll Admission Protocol for Multi-hop Wireless Ad hoc Networks un Sun Elizbeth M. Belding-Royer Deprtment of Computer Science University of Cliforni, Snt Brbr suny, ebelding

More information

9 Graph Cutting Procedures

9 Graph Cutting Procedures 9 Grph Cutting Procedures Lst clss we begn looking t how to embed rbitrry metrics into distributions of trees, nd proved the following theorem due to Brtl (1996): Theorem 9.1 (Brtl (1996)) Given metric

More information

2 Computing all Intersections of a Set of Segments Line Segment Intersection

2 Computing all Intersections of a Set of Segments Line Segment Intersection 15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design

More information

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using

More information

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES)

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) Numbers nd Opertions, Algebr, nd Functions 45. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) In sequence of terms involving eponentil growth, which the testing service lso clls geometric

More information

Section 10.4 Hyperbolas

Section 10.4 Hyperbolas 66 Section 10.4 Hyperbols Objective : Definition of hyperbol & hyperbols centered t (0, 0). The third type of conic we will study is the hyperbol. It is defined in the sme mnner tht we defined the prbol

More information

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li 2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min

More information

COMP 423 lecture 11 Jan. 28, 2008

COMP 423 lecture 11 Jan. 28, 2008 COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring

More information

Scalable Distributed Data Structures: A Survey Λ

Scalable Distributed Data Structures: A Survey Λ Sclble Distributed Dt Structures: A Survey Λ ADRIANO DI PASQUALE University of L Aquil, Itly ENRICO NARDELLI University of L Aquil nd Istituto di Anlisi dei Sistemi ed Informtic, Itly Abstrct This pper

More information

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting

More information

MATH 25 CLASS 5 NOTES, SEP

MATH 25 CLASS 5 NOTES, SEP MATH 25 CLASS 5 NOTES, SEP 30 2011 Contents 1. A brief diversion: reltively prime numbers 1 2. Lest common multiples 3 3. Finding ll solutions to x + by = c 4 Quick links to definitions/theorems Euclid

More information

such that the S i cover S, or equivalently S

such that the S i cover S, or equivalently S MATH 55 Triple Integrls Fll 16 1. Definition Given solid in spce, prtition of consists of finite set of solis = { 1,, n } such tht the i cover, or equivlently n i. Furthermore, for ech i, intersects i

More information

Topology-aware routing in structured peer-to-peer overlay networks

Topology-aware routing in structured peer-to-peer overlay networks Topologywre routing in structured peertopeer overly networks Miguel Cstro Peter Druschel Y. Chrlie Hu Antony Rowstron Microsoft Reserch, 7 J J Thomson Close, Cmbridge, C3 F, UK. Rice University, Min Street,

More information

Topology-aware routing in structured peer-to-peer overlay networks

Topology-aware routing in structured peer-to-peer overlay networks Topology-wre routing in structured peer-to-peer overly networks Miguel Cstro ½ Peter Druschel ¾ Y. Chrlie Hu Antony Rowstron ½ ½ Microsoft Reserch, 7 J J Thomson Close, Cmbridge, CB3 FB, UK. ¾ Rice University,

More information

Unit 5 Vocabulary. A function is a special relationship where each input has a single output.

Unit 5 Vocabulary. A function is a special relationship where each input has a single output. MODULE 3 Terms Definition Picture/Exmple/Nottion 1 Function Nottion Function nottion is n efficient nd effective wy to write functions of ll types. This nottion llows you to identify the input vlue with

More information

2014 Haskell January Test Regular Expressions and Finite Automata

2014 Haskell January Test Regular Expressions and Finite Automata 0 Hskell Jnury Test Regulr Expressions nd Finite Automt This test comprises four prts nd the mximum mrk is 5. Prts I, II nd III re worth 3 of the 5 mrks vilble. The 0 Hskell Progrmming Prize will be wrded

More information

Solutions to Math 41 Final Exam December 12, 2011

Solutions to Math 41 Final Exam December 12, 2011 Solutions to Mth Finl Em December,. ( points) Find ech of the following its, with justifiction. If there is n infinite it, then eplin whether it is or. ( ) / ln() () (5 points) First we compute the it:

More information

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork MA1008 Clculus nd Liner Algebr for Engineers Course Notes for Section B Stephen Wills Deprtment of Mthemtics University College Cork s.wills@ucc.ie http://euclid.ucc.ie/pges/stff/wills/teching/m1008/ma1008.html

More information

3.5.1 Single slit diffraction

3.5.1 Single slit diffraction 3..1 Single slit diffrction ves pssing through single slit will lso diffrct nd produce n interference pttern. The reson for this is to do with the finite width of the slit. e will consider this lter. Tke

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

The Distributed Data Access Schemes in Lambda Grid Networks

The Distributed Data Access Schemes in Lambda Grid Networks The Distributed Dt Access Schemes in Lmbd Grid Networks Ryot Usui, Hiroyuki Miygi, Yutk Arkw, Storu Okmoto, nd Noki Ymnk Grdute School of Science for Open nd Environmentl Systems, Keio University, Jpn

More information

INTRODUCTION TO SIMPLICIAL COMPLEXES

INTRODUCTION TO SIMPLICIAL COMPLEXES INTRODUCTION TO SIMPLICIAL COMPLEXES CASEY KELLEHER AND ALESSANDRA PANTANO 0.1. Introduction. In this ctivity set we re going to introduce notion from Algebric Topology clled simplicil homology. The min

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

3.5.1 Single slit diffraction

3.5.1 Single slit diffraction 3.5.1 Single slit diffrction Wves pssing through single slit will lso diffrct nd produce n interference pttern. The reson for this is to do with the finite width of the slit. We will consider this lter.

More information

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers Mth Modeling Lecture 4: Lgrnge Multipliers Pge 4452 Mthemticl Modeling Lecture 4: Lgrnge Multipliers Lgrnge multipliers re high powered mthemticl technique to find the mximum nd minimum of multidimensionl

More information

Midterm 2 Sample solution

Midterm 2 Sample solution Nme: Instructions Midterm 2 Smple solution CMSC 430 Introduction to Compilers Fll 2012 November 28, 2012 This exm contins 9 pges, including this one. Mke sure you hve ll the pges. Write your nme on the

More information

PNC NC code PROGRAMMER'S MANUAL

PNC NC code PROGRAMMER'S MANUAL PNC-3200 NC code PROGRAMMER'S MANUAL Thnk you very much for purchsing the PNC-3200. To ensure correct nd sfe usge with full understnding of this product's performnce, plese be sure to red through this

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Fig.25: the Role of LEX

Fig.25: the Role of LEX The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing

More information

Routers implementations

Routers implementations Routers implementtions Switching Technology S38.65 http://www.netlb.hut.fi/opetus/s3865 L - Router implementtions Generl of routers Functions of n IP router Router rchitectures Introduction to routing

More information

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization An Efficient Divide nd Conquer Algorithm for Exct Hzrd Free Logic Minimiztion J.W.J.M. Rutten, M.R.C.M. Berkelr, C.A.J. vn Eijk, M.A.J. Kolsteren Eindhoven University of Technology Informtion nd Communiction

More information

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-169 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Representation of Numbers. Number Representation. Representation of Numbers. 32-bit Unsigned Integers 3/24/2014. Fixed point Integer Representation

Representation of Numbers. Number Representation. Representation of Numbers. 32-bit Unsigned Integers 3/24/2014. Fixed point Integer Representation Representtion of Numbers Number Representtion Computer represent ll numbers, other thn integers nd some frctions with imprecision. Numbers re stored in some pproximtion which cn be represented by fixed

More information

Exploiting network proximity in peer-to-peer overlay networks

Exploiting network proximity in peer-to-peer overlay networks Eploiting network proimity in peer-to-peer overly networks Miguel Cstro Peter Druschel Y. Chrlie Hu Antony Rowstron Microsoft Reserch, J J Thomson Close, Cmbridge, CB3 FB, UK. Rice University, Min Street,

More information

If f(x, y) is a surface that lies above r(t), we can think about the area between the surface and the curve.

If f(x, y) is a surface that lies above r(t), we can think about the area between the surface and the curve. Line Integrls The ide of line integrl is very similr to tht of single integrls. If the function f(x) is bove the x-xis on the intervl [, b], then the integrl of f(x) over [, b] is the re under f over the

More information

II. THE ALGORITHM. A. Depth Map Processing

II. THE ALGORITHM. A. Depth Map Processing Lerning Plnr Geometric Scene Context Using Stereo Vision Pul G. Bumstrck, Bryn D. Brudevold, nd Pul D. Reynolds {pbumstrck,brynb,pulr2}@stnford.edu CS229 Finl Project Report December 15, 2006 Abstrct A

More information

CSCI 104. Rafael Ferreira da Silva. Slides adapted from: Mark Redekopp and David Kempe

CSCI 104. Rafael Ferreira da Silva. Slides adapted from: Mark Redekopp and David Kempe CSCI 0 fel Ferreir d Silv rfsilv@isi.edu Slides dpted from: Mrk edekopp nd Dvid Kempe LOG STUCTUED MEGE TEES Series Summtion eview Let n = + + + + k $ = #%& #. Wht is n? n = k+ - Wht is log () + log ()

More information

Replicating Web Applications On-Demand

Replicating Web Applications On-Demand Replicting Web Applictions On-Demnd Swminthn Sivsubrmnin Guillume Pierre Mrten vn Steen Dept. of Computer Science, Vrije Universiteit, Amsterdm {swmi,gpierre,steen}@cs.vu.nl Abstrct Mny Web-bsed commercil

More information

a < a+ x < a+2 x < < a+n x = b, n A i n f(x i ) x. i=1 i=1

a < a+ x < a+2 x < < a+n x = b, n A i n f(x i ) x. i=1 i=1 Mth 33 Volume Stewrt 5.2 Geometry of integrls. In this section, we will lern how to compute volumes using integrls defined by slice nlysis. First, we recll from Clculus I how to compute res. Given the

More information

UNIT 11. Query Optimization

UNIT 11. Query Optimization UNIT Query Optimiztion Contents Introduction to Query Optimiztion 2 The Optimiztion Process: An Overview 3 Optimiztion in System R 4 Optimiztion in INGRES 5 Implementing the Join Opertors Wei-Png Yng,

More information

Math 464 Fall 2012 Notes on Marginal and Conditional Densities October 18, 2012

Math 464 Fall 2012 Notes on Marginal and Conditional Densities October 18, 2012 Mth 464 Fll 2012 Notes on Mrginl nd Conditionl Densities klin@mth.rizon.edu October 18, 2012 Mrginl densities. Suppose you hve 3 continuous rndom vribles X, Y, nd Z, with joint density f(x,y,z. The mrginl

More information

12-B FRACTIONS AND DECIMALS

12-B FRACTIONS AND DECIMALS -B Frctions nd Decimls. () If ll four integers were negtive, their product would be positive, nd so could not equl one of them. If ll four integers were positive, their product would be much greter thn

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking

Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking 1 Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking Shu Du Ahamed Khan Santashil PalChaudhuri Ansley Post Amit Kumar Saha Peter Druschel David B. Johnson Rudolf Riedi Rice University

More information

Nearest Keyword Set Search in Multi-dimensional Datasets

Nearest Keyword Set Search in Multi-dimensional Datasets Nerest Keyword Set Serch in Multi-dimensionl Dtsets Vishwkrm Singh Deprtment of Computer Science University of Cliforni Snt Brbr, USA Emil: vsingh014@gmil.com Ambuj K. Singh Deprtment of Computer Science

More information

Network Layer: Routing Classifications; Shortest Path Routing

Network Layer: Routing Classifications; Shortest Path Routing igitl ommuniction in the Modern World : Routing lssifictions; Shortest Pth Routing s min prolem: To get efficiently from one point to the other in dynmic environment http://.cs.huji.c.il/~com com@cs.huji.c.il

More information

Pointwise convergence need not behave well with respect to standard properties such as continuity.

Pointwise convergence need not behave well with respect to standard properties such as continuity. Chpter 3 Uniform Convergence Lecture 9 Sequences of functions re of gret importnce in mny res of pure nd pplied mthemtics, nd their properties cn often be studied in the context of metric spces, s in Exmples

More information

Tilt-Sensing with Kionix MEMS Accelerometers

Tilt-Sensing with Kionix MEMS Accelerometers Tilt-Sensing with Kionix MEMS Accelerometers Introduction Tilt/Inclintion sensing is common ppliction for low-g ccelerometers. This ppliction note describes how to use Kionix MEMS low-g ccelerometers to

More information

a(e, x) = x. Diagrammatically, this is encoded as the following commutative diagrams / X

a(e, x) = x. Diagrammatically, this is encoded as the following commutative diagrams / X 4. Mon, Sept. 30 Lst time, we defined the quotient topology coming from continuous surjection q : X! Y. Recll tht q is quotient mp (nd Y hs the quotient topology) if V Y is open precisely when q (V ) X

More information

Chapter 2 Sensitivity Analysis: Differential Calculus of Models

Chapter 2 Sensitivity Analysis: Differential Calculus of Models Chpter 2 Sensitivity Anlysis: Differentil Clculus of Models Abstrct Models in remote sensing nd in science nd engineering, in generl re, essentilly, functions of discrete model input prmeters, nd/or functionls

More information

MATH 2530: WORKSHEET 7. x 2 y dz dy dx =

MATH 2530: WORKSHEET 7. x 2 y dz dy dx = MATH 253: WORKSHT 7 () Wrm-up: () Review: polr coordintes, integrls involving polr coordintes, triple Riemnn sums, triple integrls, the pplictions of triple integrls (especilly to volume), nd cylindricl

More information

Stained Glass Design. Teaching Goals:

Stained Glass Design. Teaching Goals: Stined Glss Design Time required 45-90 minutes Teching Gols: 1. Students pply grphic methods to design vrious shpes on the plne.. Students pply geometric trnsformtions of grphs of functions in order to

More information

A Scalable and Reliable Mobile Agent Computation Model

A Scalable and Reliable Mobile Agent Computation Model A Sclble nd Relible Mobile Agent Computtion Model Yong Liu, Congfu Xu, Zhohui Wu, nd Yunhe Pn College of Computer Science, Zhejing University Hngzhou 310027, Chin cckffe@yhoo.com.cn Abstrct. This pper

More information

Supporting Complex Multi-dimensional Queries in P2P Systems

Supporting Complex Multi-dimensional Queries in P2P Systems Supporting Complex Multi-dimensionl Queries in P2P Systems Bin Liu Wng-Chien Lee Di Lun Lee Deprtment of Computer Science Hong Kong University of Science nd Technology Deprtment of Computer Science nd

More information

A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS

A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS Ji-Eun Roh (), Te-Eog Lee (b) (),(b) Deprtment of Industril nd Systems Engineering, Kore Advnced Institute

More information

What are suffix trees?

What are suffix trees? Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl

More information

Performance analysis of QoS mechanisms in IP networks

Performance analysis of QoS mechanisms in IP networks University of Wollongong Reserch Online Fculty of Informtics - Ppers (Archive) Fculty of Engineering nd Informtion Sciences 2000 Performnce nlysis of QoS mechnisms in IP networks D. Ji University of Wollongong

More information

Chapter 7. Routing with Frame Relay, X.25, and SNA. 7.1 Routing. This chapter discusses Frame Relay, X.25, and SNA Routing. Also see the following:

Chapter 7. Routing with Frame Relay, X.25, and SNA. 7.1 Routing. This chapter discusses Frame Relay, X.25, and SNA Routing. Also see the following: Chpter 7 Routing with Frme Rely, X.25, nd SNA This chpter discusses Frme Rely, X.25, nd SNA Routing. Also see the following: Section 4.2, Identifying the BANDIT in the Network Section 4.3, Defining Globl

More information

Secure routing for structured peer-to-peer overlay networks

Secure routing for structured peer-to-peer overlay networks Secure routing for structured peer-to-peer overly networks Miguel Cstro, Peter Druschel 2, Aylvdi Gnesh, Antony Rowstron nd Dn S. Wllch 2 Microsoft Reserch Ltd., 7JJThomson Avenue, Cmbridge, CB3 FB, UK

More information

File Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment

File Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment File Mnger Quick Reference Guide June 2018 Prepred for the Myo Clinic Enterprise Khu Deployment NVIGTION IN FILE MNGER To nvigte in File Mnger, users will mke use of the left pne to nvigte nd further pnes

More information

9 4. CISC - Curriculum & Instruction Steering Committee. California County Superintendents Educational Services Association

9 4. CISC - Curriculum & Instruction Steering Committee. California County Superintendents Educational Services Association 9. CISC - Curriculum & Instruction Steering Committee The Winning EQUATION A HIGH QUALITY MATHEMATICS PROFESSIONAL DEVELOPMENT PROGRAM FOR TEACHERS IN GRADES THROUGH ALGEBRA II STRAND: NUMBER SENSE: Rtionl

More information

Epson Projector Content Manager Operation Guide

Epson Projector Content Manager Operation Guide Epson Projector Content Mnger Opertion Guide Contents 2 Introduction to the Epson Projector Content Mnger Softwre 3 Epson Projector Content Mnger Fetures... 4 Setting Up the Softwre for the First Time

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully

More information

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis On the Detection of Step Edges in Algorithms Bsed on Grdient Vector Anlysis A. Lrr6, E. Montseny Computer Engineering Dept. Universitt Rovir i Virgili Crreter de Slou sin 43006 Trrgon, Spin Emil: lrre@etse.urv.es

More information

Lab 1 - Counter. Create a project. Add files to the project. Compile design files. Run simulation. Debug results

Lab 1 - Counter. Create a project. Add files to the project. Compile design files. Run simulation. Debug results 1 L 1 - Counter A project is collection mechnism for n HDL design under specifiction or test. Projects in ModelSim ese interction nd re useful for orgnizing files nd specifying simultion settings. The

More information

Today. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search

Today. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search Uninformed Serch [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.] Tody Serch Problems Uninformed Serch Methods

More information

L. Yaroslavsky. Fundamentals of Digital Image Processing. Course

L. Yaroslavsky. Fundamentals of Digital Image Processing. Course L. Yroslvsky. Fundmentls of Digitl Imge Processing. Course 0555.330 Lecture. Imge enhncement.. Imge enhncement s n imge processing tsk. Clssifiction of imge enhncement methods Imge enhncement is processing

More information

Geometric transformations

Geometric transformations Geometric trnsformtions Computer Grphics Some slides re bsed on Shy Shlom slides from TAU mn n n m m T A,,,,,, 2 1 2 22 12 1 21 11 Rows become columns nd columns become rows nm n n m m A,,,,,, 1 1 2 22

More information

Math 142, Exam 1 Information.

Math 142, Exam 1 Information. Mth 14, Exm 1 Informtion. 9/14/10, LC 41, 9:30-10:45. Exm 1 will be bsed on: Sections 7.1-7.5. The corresponding ssigned homework problems (see http://www.mth.sc.edu/ boyln/sccourses/14f10/14.html) At

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Misrepresentation of Preferences

Misrepresentation of Preferences Misrepresenttion of Preferences Gicomo Bonnno Deprtment of Economics, University of Cliforni, Dvis, USA gfbonnno@ucdvis.edu Socil choice functions Arrow s theorem sys tht it is not possible to extrct from

More information

RIM: Router Interface Marking for IP Traceback

RIM: Router Interface Marking for IP Traceback RIM: Router Interfce Mrking for IP Trcebck Ruiling Chen *, Jung-Min Prk *, nd Rndolph Mrchny * Lbortory for Advnced Reserch in Informtion Assurnce nd Security (ARIAS) * Brdley Deprtment of Electricl nd

More information

1 Quad-Edge Construction Operators

1 Quad-Edge Construction Operators CS48: Computer Grphics Hndout # Geometric Modeling Originl Hndout #5 Stnford University Tuesdy, 8 December 99 Originl Lecture #5: 9 November 99 Topics: Mnipultions with Qud-Edge Dt Structures Scribe: Mike

More information

Node-covering, Error-correcting Codes and Multiprocessors with Very High Average Fault Tolerance

Node-covering, Error-correcting Codes and Multiprocessors with Very High Average Fault Tolerance IEEE TRANSACTIONS ON COMPUTERS, VOL. 46, NO. 9, SEPTEMBER 1997 997 Node-covering, Error-correcting Codes nd Multiprocessors with Very High Averge Fult Tolernce Shntnu Dutt, Member, IEEE, nd Nihr R. Mhptr,

More information

Improving the Connectivity of Heterogeneous Multi-Hop Wireless Networks

Improving the Connectivity of Heterogeneous Multi-Hop Wireless Networks 1569363897 1 Improving the Connectivity of Heterogeneous Multi-Hop Wireless Networks Te-Hoon Kim, Dvid Tipper, nd Prshnt Krishnmurthy Grdute Networking nd Telecommunictions Progrm University of Pittsburgh,

More information

MIPS I/O and Interrupt

MIPS I/O and Interrupt MIPS I/O nd Interrupt Review Floting point instructions re crried out on seprte chip clled coprocessor 1 You hve to move dt to/from coprocessor 1 to do most common opertions such s printing, clling functions,

More information

Algorithm Design (5) Text Search

Algorithm Design (5) Text Search Algorithm Design (5) Text Serch Tkshi Chikym School of Engineering The University of Tokyo Text Serch Find sustring tht mtches the given key string in text dt of lrge mount Key string: chr x[m] Text Dt:

More information

Preserving Constraints for Aggregation Relationship Type Update in XML Document

Preserving Constraints for Aggregation Relationship Type Update in XML Document Preserving Constrints for Aggregtion Reltionship Type Updte in XML Document Eric Prdede 1, J. Wenny Rhyu 1, nd Dvid Tnir 2 1 Deprtment of Computer Science nd Computer Engineering, L Trobe University, Bundoor

More information

IP: Network Layer. Goals and Tasks. Routing. Switching. Switching (cont.) Datagram v/s Virtual Circuit. Overview Addressing Routing

IP: Network Layer. Goals and Tasks. Routing. Switching. Switching (cont.) Datagram v/s Virtual Circuit. Overview Addressing Routing IP: Network Lyer Overview Addressing Routing Overview Gols nd Tsks Routing Switching Issues Bsic ides TOC IP TOC IP Overview Gols nd Tsks Gols of Network Lyer Guide pckets from source to destintion Use

More information

Functor (1A) Young Won Lim 10/5/17

Functor (1A) Young Won Lim 10/5/17 Copyright (c) 2016-2017 Young W. Lim. Permission is grnted to copy, distribute nd/or modify this document under the terms of the GNU Free Documenttion License, Version 1.2 or ny lter version published

More information

A dynamic multicast tree based routing scheme without replication in delay tolerant networks

A dynamic multicast tree based routing scheme without replication in delay tolerant networks Accepted Mnuscript A dynmic multicst tree bsed routing scheme without repliction in dely tolernt networks Yunsheng Wng, Jie Wu PII: S0-()00- DOI: 0.0/j.jpdc.0..00 Reference: YJPDC To pper in: J. Prllel

More information

SUPPLEMENTARY INFORMATION

SUPPLEMENTARY INFORMATION Supplementry Figure y (m) x (m) prllel perpendiculr Distnce (m) Bird Stndrd devition for distnce (m) c 6 prllel perpendiculr 4 doi:.8/nture99 SUPPLEMENTARY FIGURE Confirmtion tht movement within the flock

More information

x )Scales are the reciprocal of each other. e

x )Scales are the reciprocal of each other. e 9. Reciprocls A Complete Slide Rule Mnul - eville W Young Chpter 9 Further Applictions of the LL scles The LL (e x ) scles nd the corresponding LL 0 (e -x or Exmple : 0.244 4.. Set the hir line over 4.

More information

Journal of Graph Algorithms and Applications

Journal of Graph Algorithms and Applications Journl of Grph Algorithms nd Applictions http://www.cs.brown.edu/publictions/jg/ vol. 5, no. 5, pp. 17 38 (2001) New Bounds for Oblivious Mesh Routing Kzuo Iwm School of Informtics Kyoto University Kyoto

More information

Vulnerability Analysis of Electric Power Communication Network. Yucong Wu

Vulnerability Analysis of Electric Power Communication Network. Yucong Wu 2nd Interntionl Conference on Advnces in Mechnicl Engineering nd Industril Informtics (AMEII 2016 Vulnerbility Anlysis of Electric Power Communiction Network Yucong Wu Deprtment of Telecommunictions Engineering,

More information

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants A Heuristic Approch for Discovering Reference Models by Mining Process Model Vrints Chen Li 1, Mnfred Reichert 2, nd Andres Wombcher 3 1 Informtion System Group, University of Twente, The Netherlnds lic@cs.utwente.nl

More information

Math 35 Review Sheet, Spring 2014

Math 35 Review Sheet, Spring 2014 Mth 35 Review heet, pring 2014 For the finl exm, do ny 12 of the 15 questions in 3 hours. They re worth 8 points ech, mking 96, with 4 more points for netness! Put ll your work nd nswers in the provided

More information