Multipath Selection and Channel Assignment in Wireless Mesh Networks

Size: px
Start display at page:

Download "Multipath Selection and Channel Assignment in Wireless Mesh Networks"

Transcription

1 Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, Kusung-dong, Taejon, Korea Tel: , FAX: Eail: {pz1004, Abstract In wireless networs, it is very iportant to optiize the nuber of channels, due to the liit on the nuber of usable channels in a given networ. In addition, ultiedia services with high QoS requireents with respect to throughput and delay have recently becoe popular. To satisfy these requireents, it has becoe iportant to find a way of providing ultipath transission. A channel assignent algorith is presented that iniizes the nuber of required channels while satisfying the throughput requireents of sourcedestination pairs in ultichannel, ultiradio, ultirate wireless esh networs. A atheatical odel is proposed that considers interference effect, lin capacity, and throughput requireents. A novel channel assignent algorith is developed that taes into account ultipath selection, channel reusability, lin capacity sharing, and global optiization. The perforance of the algorith is copared with that of CPLEX, using 24 networ scenarios. The axiu gap between the CPLEX solutions and those of the proposed algorith is, on average, only 4.8%. Keywords unicast, channel assignent, ultipath transission, QoS requireent, wireless Mesh networs 1. Introduction A Wireless Mesh Networ [1, 2] is a fully connected wireless ultihop networ whose nodes are all connected to each other via ultiple hops, as shown in Figure 1. The networ is ade up of access points (APs), wireless esh routers (WMRs), and obile nodes (MNs) and supports two types of transission: (i) infrastructureless ultihop transission via counication devices, such as the widely nown Ad Hoc Networs and (ii) infrastructure-based transission via WMRs and APs. As a result, the networ can benefit, not only fro the efficiency of ultihop transissions, but also fro the stability of using APs and WMRs. APs also allow counication between wired Internet and wireless devices. To date, a nuber of notable papers on wireless esh networs have been published, on such atters as power control, channel assignent, routing echaniss, networ connectivity, and QoS issues. Aong these topics, efficient channel assignent and QoS issues are regarded as being of ajor iportance. The channel assignent proble can be seen fro two points of view. One is iniizing the nuber of required channels and the other is fully utilizing the given aount of channels. QoS issues recently have becoe the subject of particular interest, due to the increase in ultiedia streaing services such as IPTV/VOD services. Multiedia streaing services have various and high QoS requireents, according to the content or desired service qualities. The QoS requireents need to be satisfied in order to provide sealess service. Providing ultipath transission is one way of satisfying these requireents [3, 4, 6, 15, 16, 23]. Benefits of ultipath transissions are fault tolerance, load balancing, bandwidth aggregation, reduced delay, etc. [23]. Aong the, two ajor benefits of applying ultipath transission to ultiedia traffics are bandwidth aggregation and reduced delay. First, when lins suffer bad channel condition and restricted bandwidth, single path ay not satisfy the high throughput requireent of the ultiedia traffics. In such a case, ultipath transission splitting data through ultiple different paths can help to satisfy the throughput requireent. Second, when a path is broen, source-destination pair cannot counicate until the alternative path is found, which increases the end-to-end delay. However, this ultipath technique tends to increase the nuber of Figure 1 Wireless esh networs [1] 1

2 required channels in the networ. That being so, for ultipath transission, deciding the nuber of ultipaths between a source-destination pair is one of the ost iportant issues. The ter given ultipath in the paper refers to the ultipath routes fored by any existing ultipath routing algorith. Thus ultipath selection refers to the selection of a cobination of given ultipaths for flow streas. It does not ean the foration of ultipath routes as used in the other papers. The channel assignent proble of iniizing the nuber of required channels while satisfying the throughput requireents of source-destination pairs is a well-nown NP-hard proble [4]. In this paper, we present a way of solving this proble, taing into account the throughput requireents of sourcedestination pairs and other networ-related constraints in the channel assignent proble. Our solution to the proble has notable iplications. For instance, it can be applied to ultiedia services. As noted above, ultiedia services have various QoS requireents. If all the ultiedia services are being provided by the networ, it is iportant to allocate the necessary resources to each source-destination pair according to its QoS requireent, so that the networ resources can be used efficiently. For the defined proble, we propose a atheatically forulated odel using binary integer prograing and a novel channel assignent algorith. The contributions of this paper are that (i) we odel the ultipath selection and channel assignent proble atheatically, considering constraints such as lin capacity, throughput requireents, and interference effect and (ii) propose a ultipath selection and channel assignent algorith that taes ultipath selection, channel reusability, and global optiization into account. The reainder of this paper is organized as follows. Section 2 discusses related wor on channel assignent and ultipath routing. Section 3 presents the syste odel, including assuptions, interference, and networ flow odels, that is used throughout the paper. Section 4 describes the channel assignent proble in detail. Section 5 introduces the proposed channel assignent algorith. Section 6 describes the siulation and discusses the results. Section 7 concludes. 2. Related Wor 2.1. Channel Assignent Research on the channel assignent issue focuses on either distributed or centralized algoriths. In distributed algoriths, nodes use the local lin-state inforation (usually within a two-hop or three-hop range) and allocate channels in a distributed anner [7, 9, 10, 18, 20, 21]. The distributed algoriths focus ore on how to obtain -hop neighbor inforation, how to solve hidden node probles, and how to handle changes of local inforation rather than the optiization proble itself. Centralized algoriths use the global lin states and traffic inforation to centrally allocate channels to the networs [4, 5, 17, 18, 19]. Centralized algoriths are liely to yield a better solution than a distributed algorith, because they use the full networ inforation, rather than local lin-state inforation and focus ore on optiizing the networ resources and perforances. However, they require heavy overhead to aintain the networ topology and the global lin-state inforation when the networ size is big. In [4], the authors siply assign channels to lins with heavy traffic first, while in [5], an algorith to optiize throughput considering the fairness constraints is suggested. However, neither of these algoriths taes into account the networ interference. In [17], the authors consider interference between routers in the esh networs and also, the esh networ and other co-located wireless networs, while in [18], the authors try to iniize interference considering the nuber of networ interface card liitation of each node. In [19], the authors consider ulti-rate nature of the wireless networ. But none of the papers entioned above consider ultipath transission between sourcedestination pairs and lin capacity sharing aong several flows Multipath Transission and Selection The ultipath transission issue can be addressed in two ways: the ipleentation of bacup paths and concurrent paths, according to how the ultipath inforation is used. The bacup paths ethod uses ultipath inforation as a suppleent path [22]. When the current path is broen, due to obstacles or the obility of the source, destination, or relay nodes, the source-destination pair uses a suppleentary path for transission. This can reduce the end-to-end delay caused by searching for a new route while counicating. However, if the current path is sufficiently reliable and does not brea during the transission, the reserved resource in the suppleent path is wasted. The concurrent path ethod transits flows concurrently along the ultiple paths [3, 4, 6, 11]. There are two ways of ipleenting this ethod according to whether the sae flows or different flows are transitted through the ultipath. The sae flows are generally used for transissions where reliability is the critical issue, such as when sending eergency signals [11]. However, using the sae flows can generate excessive inefficiency in the networs. Different flows are ostly used to increase the throughput of the networs [3, 4, 6]. To date, ost research on the concurrent path ethod has only considered the use of the sae nuber of ultipath for all source-destination pairs in the networ. In this case, even though the QoS requireent of soe sourcedestination pairs can be achieved using only a single path, 2

3 these pairs use ore resource than a single path, which causes inefficiency in the networ. Many studies on channel assignent have dealt with throughput optiization, but few have considered the various throughput requireents of source-destination pairs. Further, to the authors nowledge, no reported study has considered a ultipath selection schee, which uses the given ultipath inforation selectively for counication in order to iniize the nuber of required channels. If the throughput requireent is high, the source-destination pair is liely to use two or ore paths for transission in order to distribute its high throughput requireent across ultiple paths. However, if the throughput requireent is low, the pair is liely to use only a single path for transission. Using the nuber of ultipath dynaically according to such deands, networ resources can be used efficiently. 3. Syste Model and Assuptions 3.1. Assuptions We assue that the ultipath inforation for each source-destination pair is given. However, a sourcedestination pair does not have to use all the given ultipath. It can selectively use a portion of the ultipath inforation, in order to iniize the nuber of required channels. A pair can flow through a ultipath siultaneously to increase the throughput of a sourcedestination pair. In this case, the su of the flow rate of its ultipaths is the flow rate of the pair. All devices, such as APs, WMRs, and MNs are equipped with several networ interface cards (NICs). There are no collisions in the networs, and the lin capacity varies according to the transission range Interference Model We define the interference set I(i, j) as the lins in the interference range of a lin (i, j), where (i, j) denotes a directional lin fro i to j. The interference effect eans that a lin (i, j) and its interference set I(i, j) cannot transit siultaneously with the sae channel. In Figure 2, the interference set I(1, 2) is the lin set {(2, 7), (3, 4)} and by the interference effect, lins (1, 2), (2, 7) and (3, 4) cannot use the sae channel. However, lins (1, 2) and (5, 6) can use the sae channel for transission Networ Flow Model The flow can be divided and flow along ultipaths siultaneously, which aes it possible to increase the throughput between the source-destination pair without using two or ore channels in one lin. By exploiting this characteristic, we can vary the ways in which the throughput requireent of the source-destination pair can be satisfied. We can use additional channels in a bottlenec lin or use additional ultipaths Routing Model We assue that when a source sends a data pacet to a destination, the entire path inforation is included in the pacet header, as is the case with the dynaic source routing (DSR) algorith [8, 11, 12]. The flow siply follows the route that the source node has decided and cannot be erged or divided at the relay nodes. 4. Proble Forulation 4.1. Notations A networ is represented by a directed graph G = (V, E), where V represent a set of vertices that includes APs, WMRs, and MNs, and E represents the transission lins. C represents the set of all the possible channels in the networ. The following notation is used in the ixed integer linear prograing (MILP) forulation: R : Throughput requireent of the sourcedestination pair C ij : Channel capacity of lin (i,j) Figure 2 Interference odel Figure 3 Saple networ for P 3

4 f ij : Data rate of the th path of the sourcedestination pair using lin (i, j) r : The end-to-end data rate of the th path of the source-destination pair (The iniu data rate aong the lins that constitute the th path of the source-destination pair is the endto-end data rate of the th path of the sourcedestination pair ) x c ij: a binary variable to represent the occupancy of channel c in a lin (i, j) w c : a binary variable to represent the occupancy of channel c in the networ P : a set of lins constituting the th path of the source-destination pair For the saple networ given in Figure 3, we have the following paths: P 11 = {(1, 3), (3, 4), (4, 5), (5, 6)} P 12 = {(1, 7), (7, 5), (5, 6)} P 21 = {(2, 4)} P 22 = {(2, 3), (3, 4)} 4.2. Objective and Constraints The objective is to iniize the nuber of required channels in the networ: Min cc w c (1) We consider the following five constraints: Throughput requireent Flow conservation equation Lin capacity Networ s channel occupancy Interference effect The first constraint is the throughput requireent. The end-to-end data rate of all source-destination pairs should be higher than their own throughput requireents. r R, for all K (2) M The second constraint is the flow conservation equation. The incoing and outgoing data rate for every node should be conserved. For each source-destination pair, the outgoing rate of the source is r, the incoing rate of the destination is r, and the difference between the incoing and outgoing rate of the relay nodes is 0. Relay nodes only relay the incoing flows to the next nodes. f ij ji { j ( i, j) P } { j ( j, i) P },,,, r if i s for all M and K r if i d for all M and K 0, otherwises, for all M and K (3) The third constraint is the lin capacity. The su of the rates of all flows that flow through a lin (i, j) should be less than the lin capacity of the lin (i, j). The capacity of a lin (i, j) is the product of the nuber of occupied channels in the lin (i, j) and the axiu transission rate of a channel, which is decided by the distance between nodes i and j. c f C x, for all ( i, j) E (4) ij ij ij K M cc The fourth constraint is the networ s channel occupancy. This constraint checs whether or not channel c is used in the networ. c c x w, for all ( i, j) E and c C (5) ij The fifth constraint is the interference effect. The sae channel cannot be used in a lin (i, j) and its interference set I(i, j). If channel c is occupied by the lin (i, j), none of the lins in the interference range of the lin (i, j) can use channel c for transission. c c xij xi j 1, for all (, i j) I(, i j), (, i j) E and cc (6) 4.3. Forulation of the Defined Multipath Selection and Channel Assignent Given the foregoing, the defined ultipath selection and channel assignent proble can be forulated as MILP1. Note that finding a channel assignent for optial perforance even when the ultiple paths are given is NP-hard [4]. This iplies that the solution tie of any nown exact algorith increases exponentially as the size of the proble increases, which eans that any nown exact algorith is inappropriate for a real-world solution to the proble. Therefore, we suggest ultipath selection and channel assignent algorith that will solve the proble and that is suitable for use in real-world applications, in a reasonable aount of tie, with satisfying results. f 4

5 MILP1: Min w subject to r R, for all K M cc ij ji { j ( i, j) P } { j ( j, i) P } 5. Algorith c r, if i s, for all M and K f f r if i d for all M and K 0, otherwises, for all M and K c f C x, for all ( i, j) E,, ij ij ij K M cc c c xij w, c c ij i j c ij c for all ( i, j) E and c C x x 1, for all ( i, j) I( i, j), ( i, j) E and c C x {0,1}, for all ( i, j) E and c C w {0,1}, for all c C The proposed algorith considers four iportant aspects to satisfy the objective of iniizing the nuber of required channels of the networs: ultipath selection, lin capacity sharing, channel reusability, and global optiization. The algorith consists of Multipath Selection, Channel Allocation and Channel Rearrangeent, as shown in Figure Multipath Selection and Channel Allocation We first assue -shortest paths are given for each source-destination pair. We then select a subset of the - shortest paths that requires least nuber of channels. The nuber of required channels for each source and destination pair is deterined by preassigning a channel in each lin with the following reuse policy. (1) Reuse the channel previously allocated to the lin by other source-destination pairs. This case is possible only when the lin has soe extra bandwidth for current source-destination pair. (2) Reuse the channel used out of its interference range of the lin The interference is not considered for initial channel assignent. However, as the iterations proceed, we tae into account the inforation about channels and data rates that were previously allocated by other flows. At each iteration, when all source-destination pairs are exained, we select the source-destination pair and its ultipaths that give the least nuber of required channels. Algorith. Multipath Selection and Channel Allocation Input: Networ graph G(V, E), Set of sourcedestination pair K, Set of subset of ultipaths of sourcedestination pair M Output: Channel allocation inforation E c, Data rate allocation inforation E d Figure 4 Channel assignent algorith Repeat For each pair K do For each subset of ultipath M do Calculate the nuber of required channels of referencing E c, E d and G(V,E). End for Select that has the least nuber of required 5

6 channels as the ultipath of the pair. End for Select the pair that has the least nuber of required channels aong set K. Allocate channels and a data rate to the ultipath of pair Update E c, E d Delete the pair fro the set K. Until set K is epty When calculating the nuber of required channels for ultipaths of a source-destination pair, we consider the inforation about previously allocated channels and data rates. This allows us to use two iportant properties: (i) lin capacity sharing by which we can reduce the nuber of required channels by using the sae lin between two or ore flows; and (ii) channel reusability, by which we can reuse the sae channel without affecting the nuber of required channels as long as we avoid the interference range of a channel. For exaple, if channel c is allocated to lin (i, j), then using channel c in the lin (i', j'), which is outside the interference range of lin (i, j), would not affect the total nuber of channels that the networ requires. In addition, using the reaining capacities of the lins to which channels and data rate were previously allocated by other flows would not affect the total nuber of channels that are required. So, in both cases, it is efficient to use channel c in the lin (i', j') and the path that contains the lins. The channel allocation process utilizes these properties. Hence, we can conclude that the channel allocation process prootes the sharing of lins or the reusing of channels, thereby reducing the total nuber of required channels Channel Rearrangeent Figure 5 Saple networ for the algorith At the start of the channel rearrangeent process, the channels are preliinarily allocated to the networ as in the previous section. Since the preliinary allocation is perfored based on each path connecting sourcedestination pair, the allocation ay inefficiently increase the nuber of required channels. To solve this proble, we reallocate channels to the lins by odifying the Welsh and Powell s algorith [13] as follows. The steps in the algorith are as follows: 1) Sort the lins in decreasing order of the size of their interference sets and initially leave every lin with no channel. 2) Traverse the lins in order, assigning channel 1 to the first lin that has not yet received an allocation, provided that it does not yet have a neighbor with channel 1 allocated to it. 3) Repeat this process with channels 2, 3, etc. until channels have been allocated to all lins. 5.3 Tie Coplexity of the Algorith Paraeters that affect the tie coplexity of the proposed algorith are the nuber of channels c, the nuber of given ultipaths, and the nuber of pairs p. Figure 6 Multipath Selection and Channel allocation (the first iteration) 6

7 Figure 7 Multipath Selection and Channel allocation (the second iteration) Figure 8 Result of channel allocation Figure 9 Channel rearrangeent 7

8 Considering basic operations of the algorith, the coplexity of the Multipath Selection and Channel Allocation is given by O(p*(p*(2 *(*(p*)*c)+2 )+p)) = O(c*p 3 * 2 *2 ) The coplexity of Channel Rearrangeent becoes O((p*) 2 +c*(p*)*(p*)) = O(c*p 2 * 2 ) Fro the above, the tie coplexity of the proposed algorith is O(c*p 3 * 2 *2 ). It shows that the coplexity depends ostly on (i) the nuber of ultipaths and (ii) the nuber of source-destination pairs Algorith Process with a Saple Networ We now exaine how the algorith wors by following an exaple given in Figure 5: 1) Overview The saple networ in Figure 5 has two sourcedestination pairs. Each pair has two given ultipaths (P1 and P2) and a throughput requireent. We can predict that the ultipath selection and channel allocation process needs two iterations to allocate channels and data rates to two source-destination pairs, one for each pair. The algorith follows the three processes: 1. Multipath Selection and Channel Allocation (the first iteration) 2. Multipath Selection and Channel Allocation (the second iteration) 3. Channel Rearrangeent 2) Process 1. Multipath Selection and Channel Allocation (the first iteration) We choose the P2 of the source-destination pair 2 that has the least nuber of required channels and allocate channels 1, 2, and 3 and a data rate 0.7 Mbps, which is the throughput requireent of source-destination pair 2. Given that there exists a source-destination pair to which channels and data rate are not assigned, continue with a second iteration. 2. Multipath Selection and Channel Allocation (the second iteration) Given that there is only one pair left, we only have to decide the route that requires the least nuber of channels. In the first iteration, channels 1, 2, and 3 are already assigned to P2 of source-destination pair 2. Considering channel reusability, using channel 1, 2, and 3 again in source-destination pair 1 does not affect the required nuber of channels. So the nuber of channels that are required for P1 and P2 of source-destination pair 1 change; the result is shown below. We select P1 of source-destination pair 1 and allocate channels 1, 2, 3, 4, and 5 and a data rate 1 Mbps, which is the throughput requireent of source-destination pair 1. Given that the channel and data rate of all pairs are allocated, we go to the channel rearrangeent process. 3. Channel Rearrangeent We delete all of the inforation about the preliinary allocation of channels, and reallocate the sallest possible channel index aong the possible channel set in order of the size of interference sets. We can see that the nuber of required channels has decreased to 4 fro 5 after channel rearrangeent. 6. Siulation The siulation is perfored using the following set up. The networ topology consists of one AP, wireless esh routers (which coprised 20% of the nodes in the networ), and obile nodes. The AP is placed in the center of the networ space. The wireless esh routers and obile nodes are distributed randoly over a terrain of 700 X 700 eters. The transission rates are given in Table 1. The axiu transission range is 90 and the interference range is 180 [5]. We use the -shortest path algorith to find the - ultipath inforation between every source-destination pair. All procedures are run on a Pentiu IV-2.8 GHz PC with 1024Mbytes of eory. In the siulation, we first copare our algorith with nearly optial solutions that are obtained by CPLEX[14] to solve the MILP forulation presented in Section 4. CPLEX is an optiization software pacage that can solve linear prograing, quadratic prograing, integer prograing, and ixed integer linear prograing probles (MILP). CPLEX applies the branch and cut technique for solving MILP probles. The nuber of branches in the branch and cut technique increases exponentially as the nuber of binary decision variables increases. Thus, we adopt a tieout stopping rule to ensure the search to terinate in a reasonable tie. For exaple, in the case of 50 nodes, 10 source-destination pairs and 2 ultipaths, the nuber of binary decision Table 1 Transission rate vs. transission range 8

9 Table 3 Throughput requireent variation test Figure 10 Nuber of nodes vs. average gap (pairs = 0.2* nodes) Figure 12 Effect of variation in throughput requireent (pairs = 0.2 * nodes) Figure 11 Nuber of nodes vs. average gap (pairs = 0.4 * nodes) variables is about 500, and it generates huge nuber of branches. Without the tieout stopping rule, the process ight continue several ore hours until the coputer runs out of eory without any progress in the solution. 10,000 seconds is a long enough CPU tie for our proble instances before the coputer runs out of eory. In ost cases, CPLEX solves channel allocation probles and yields optial solutions. However, as the probles becoe ore coplex, CPLEX fails to solve the within the tie liit of 10,000 seconds, due to the exponentially increasing nuber of branches that are generated during the search process. In this case, we copare our algorith with the best feasible solutions that CPLEX obtained within the tie liit. We test our algorith with 24 networ scenarios and copare with CPLEX solutions. Table 2 shows the siulation results. Networ scenarios are varied in ters of the nuber of nodes, the nuber of source-destination pairs, and the nuber of given ultipaths. The nubers of nodes considered are 10, 20, 30, and 50. The nuber of source-destination pairs is set at 20% and 40% of the nuber of nodes. The tests are perfored with 1, 2, and 3 ultipaths. The throughput requireents of the sourcedestination pairs have a unifor distribution between [0.5, 2.0] Mbps. For each networ scenario, five probles are randoly generated and copared with the CPLEX solutions. Figure 13 Effect of variation in throughput requireent (pairs = 0.4 * nodes) Figure 14 Effect of variation in throughput requireent (20 nodes) Figure 10 and 11 show the average gap between the algorith and CPLEX. M1, M2, and M3 indicate the nuber of given ultipaths (1, 2, and 3, respectively). In Figure 10, the nuber of source-destination pairs is 20% of the nuber of nodes, while in Figure 11 it is 40%. The outstanding perforance of the algorith can be seen fro these figures. Copared with CPLEX solutions, 9

10 Figure 15 Effect of the nuber of given ultipaths (pairs = 0.2 * nodes) Figure 16 Effect of the nuber of given ultipaths (pairs = 0.4 * nodes) when the nuber of pairs is 20% of the nuber of nodes, the axiu average gap is 4.7%, whereas when the nuber of pairs is 40% of the nuber of nodes, the worst average gap is 4.8%. Fro Figures 10 and 11, it is clear that the average gap increases as the nuber of nodes increases for singlepath cases. However, the average gap decreases as the nuber of nodes increases for two and three given ultipaths. For 30 and 50 nodes, the average gap for M1 is saller than that for M2 and M3 in Figure 10, whereas in Figure 11 the average gap for M1 is greater than that for M2 and M3. The reason for these results is the relationship between the coplexity of the probles and the solutions yielded by CPLEX. CPLEX ostly fails to yield an optial solution within the tie liit when the proble becoes coplex. Next, we test the algorith by varying the siulation environent with respect to throughput requireent and the nuber of given ultipaths between sourcedestination pairs. To deterine the effect of variation in throughput requireent, we eep other siulation paraeters constant and vary the throughput requireents of source-destination pairs aong 0.5, 1, and 2 Mbps. To deterine the effect of the nuber of given ultipaths, we eep other siulation paraeters constant and vary the nuber of given ultipath of source-destination pairs aong 1, 2, and 3. Figures 12, 13, and 14 represent the effect of different throughput requireents on the nuber of channels for different nubers of nodes and pairs, while eeping other paraeters fixed. Table 3 shows the test conditions of Figures 12, 13 and 14. For exaple, in Figure 12, the throughput requireent is varied fro 0.5 Mbps to 2 Mbps and the nuber of nodes is varied fro 10 to 50, while the ratio of the nuber of pairs to the nuber of nodes is fixed at 1:5. Fro Figures 12, 13, and 14, we can see that the nuber of channels increases only slightly as the throughput, nuber of nodes, and nuber of pairs increase. This is because our algorith eploys lin sharing and channel reuse. The flows in the networ tend to share or reuse the sae channel frequently, in order to reduce the total usage of channels in the networ. Figures 15 and 16 show the effect of the nuber of given ultipaths on the nuber of channels. In Figure 15, the nuber of given ultipaths varies fro 1 to 3, the nuber of nodes varies fro 10 to 50, and the ratio of the nuber of pairs to the nuber of nodes is 1:5. In Figure 16, the nuber of given ultipaths varies fro 1 to 3, the nuber of nodes varies fro 10 to 30, and the ratio of the nuber of pairs to the nuber of nodes is 2:5. Figure 17 Tie coplexity of the algorith (tie vs. pairs) 10

11 Fro Figures 15 and 16, we can see that the nuber of channels decreases as the nuber of given ultipaths increases. The networ scenarios with three given ultipaths provide ore opportunity to choose routes that utilize lin sharing and channel reusability than those with only one or two given ultipaths. Note that we do not have to provide flows to all the given ultipaths. Figure 17 shows the tie coplexity of the algorith for axiu 100 nodes. 20% and 40% of the node size are considered for the nuber of source-destination pairs with two given ultipaths. Fro the figure, it is clear that the suggested algorith is powerful to provide practical solution to the ultipath selection and channel assignent in wireless esh networs. 7. Conclusion We have addressed the channel assignent proble of iniizing the nuber of channels while considering the throughput requireents of source-destination pairs in ultichannel, ultiradio, ultirate wireless esh networs. We forulated the channel assignent proble, which is a well-nown NP-hard proble, through binary integer prograing and proposed a novel algorith for assigning channels. Specifically, the atheatical odel considers such constraints as interference effect, lin capacity, and throughput requireents and the algorith taes two processes into account to obtain better solutions. First, we suggested a pair selection process. When selecting a pair to allocate next, we refer to the previously allocated channel and data rate inforation to exploit the benefits of channel reusability and lin capacity sharing. Second, we suggested a channel rearrangeent process. The allocation of one pair at a tie iteratively ay cause the solution to fall into a local optiu. Hence, in this process, we delete the previously allocated channel inforation and reallocate channels to the networs. Fro the analyses, it is evident that the nuber of channels decreases as the nuber of given ultipaths increases and slowly increases as the throughput requireents of source-destination pairs increase. This is due to the factors that our algorith considers. A greater nuber of given ultipaths offers ore opportunity to exploit the benefits of channel reusability and the sharing of lin capacity. In addition, sharing lin capacity alleviates the increent of throughput requireents of source-destination pairs. The perforance of the proposed algorith was evaluated by running siulations of 24 different sets of networ scenarios and coparing the results to the CPLEX solutions, which give nearly optial values. CPLEX tends to fail to obtain optial solutions when the proble sizes get bigger and, as a result, becoe coplex. In these cases, we copared our results with the solutions that CPLEX obtained during 10,000 seconds. The siulation results verify that the proposed channel assignent algorith is very effective. References 1. Ayildiz, I.F., Wang, X., and Wang, W., (2005). Wireless esh networs: a survey. Coputer Networs Journal (Elsevier). 2. Bruno, R., Conti, M., and Gregori, E., (2005) Mesh networs: coodity ultihop ad hoc networs. IEEE Counications Magazine, v.43(3), pp Sheriff, I., and Belding-Royer, E., (2006). Multipath Selection in Multi-radio Mesh Networs. Broadnets 2006, pp Raniwala, A., Gopalan, K., and Chiueh, T.-C., (2004). Centralized channel assignent and routing algoriths for ulti-channel wireless esh networs. ACM Mobile Coputing and Counications Review (MC2R), vol 8(2), pp Alicherry, M., Bhatia, R., and Li, L., (2006). Joint Channel Assignent and Routing for Throughput Optiization in Multiradio Wireless Mesh Networs. IEEE Journal on Selected Areas in Counications, Vol. 24, No. 11, pp Tsai, J.W., and Moors, T., (2007). Interference-aware Multipath Selection for Reliable Routing in Wireless Mesh Networs. Mobile Adhoc and Sensor Systes, pp Raniwala, A., and Chiueh, T., (2005). Architecture and algoriths for an IEEE based ultichannel wireless esh networ. INFOCOM 2005, Vol. 3, pp Johnson, D.B., and Maltz, D.A., (1996). Dynaic source routing in ad hoc networs. Mobile Coputing, Vol Cidon, I., and Sidi, M., (1989). Distributed assignent algoriths for ultihop pacet radio networs. IEEE Transactions on Coputers, vol.38, no.10, pp Ko, B.-J., Misra, V., Padhye, J., and Rubenstein, D., (2007). Distributed channel assignent in ulti-radio esh networs. IEEE Wireless Counications and Networing Conference, pp Leung, R., Liu, J., Poon, E., Chan, A.L.C., and Li, B., (2001). MP-DSR: a QoS-aware ulti-path dynaic source routing protocol for wireless ad-hoc networs. Proceedings of the 26th IEEE Annual Conference on Local Coputer Networs, pp Johnson, D.B., Maltz, D.A., and Broch, J., (2001). DSR: the dynaic source routing protocol for ultihop wireless ad hoc networs. Ad hoc networing, pp Welsh, D.J.A., and Powell, M.B., (1967). An upper bound for the chroatic nuber of a graph and its 11

12 application to tietabling probles. The Coputer Journal pp CPLEX 10.1, Marina, M.K., and Das, S.R., (2001). On-Deand Multi Path Distance Vector Routing in Ad Hoc Networs. Proceedings of the Ninth International Conference on Networ Protocols, p Nasipuri, A., Casta, R., and Das, S.R., (2001). Perforance of Multipath Routing for On-Deand Protocols in Mobile Ad Hoc Networs. Mobile Networs and Applications, vol.6, no.4, pp Raachandran, K.N., Belding, E.M., Aleroth, K.C., Buddhiot, M.M., (2007). Interference-Aware Channel Assignent in Multi-Radio Wireless Mesh Networs. IEEE Infoco. 18.Prabhu, A., Gupta, H., Das, S., (2008). Miniu Interference Channel Assignent in Multiradio Wireless Mesh Networs. IEEE Transactions on Mobile Coputing. 19.Lin, K.C.-J., Chou, C.-F., (2009). Exploiting ultiple rates to axiize the throughput of wireless esh networs. IEEE Transactions on Wireless Counications. 20. Bononi, L., Felice, M.D., Molinaro, A., Pizzi, S., (2009) A cross-layer architecture for efficient ultihop counication in ulti-channel ulti-radio wireless esh networs. IEEE SECON Worshops 21. Huang, R., Ki, S., Zhang, C., Fang, Y., (2009). Exploiting the capacity of ultichannel ultiradio wireless esh networs. IEEE Transactions on Vehicular Technology. 22.Nasipuri, A., Das, S., (1999). On-deand ultipath routing for obile ad hoc networs. Coputer Counication Networs. 23.Tsai, J., Moors, T., (2006). A Review of Multipath Routing Protocols: Fro Wireless Ad Hoc to Mesh Networs. Proc. ACoRN Early Career Researcher Worshop on Wireless Multihop Networing. 12

13 Table 2 Siulation result 13

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS

COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS International Journal of Coputer Science and Counication Vol. 3, No. 1, January-June 2012, pp. 181-185 COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS A.H. Karode 1, S.R. Suralkar 2, Manoj Bagde

More information

Integrating fast mobility in the OLSR routing protocol

Integrating fast mobility in the OLSR routing protocol Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract

More information

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13 Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical

More information

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University

More information

Survivability Function A Measure of Disaster-Based Routing Performance

Survivability Function A Measure of Disaster-Based Routing Performance Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected

More information

Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks

Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networs F. Mousavi Madani Departent of coputer engineering Alzahra University Tehran, Iran, osavif@alzahra.ac.ir Received:

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu

More information

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University

More information

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium 1 A Distributed Multi-service Resource Allocation Algorith in Heterogeneous Wireless Access Mediu Muhaad Isail, Student Meber, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract In this paper, radio resource

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction Relocation of ateway for Enhanced Tieliness in Wireless Sensor Networks Keal Akkaya and Mohaed Younis Departent of oputer Science and Electrical Engineering University of Maryland, altiore ounty altiore,

More information

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information

DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION

DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION www.arpnjournals.co DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION N. Snehalatha 1 and Paul Rodrigues 2 1 School of Coputing, SRM University, Chennai, Tail Nadu, India 2 Departent

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Navodaya Garepalli Kartik Gopalan Ping Yang Coputer Science, Binghaton University (State University of New York) Contact:

More information

Collaborative Web Caching Based on Proxy Affinities

Collaborative Web Caching Based on Proxy Affinities Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA

More information

Data & Knowledge Engineering

Data & Knowledge Engineering Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID

More information

Equation Based Congestion Control for Video Transmission over WCDMA Networks

Equation Based Congestion Control for Video Transmission over WCDMA Networks Equation Based Congestion Control for Video Transission over WCDMA Networks Antonios Alexiou, Diitrios Antonellis and Christos Bouras Research Acadeic Coputer Technology Institute, Greece and Coputer Engineering

More information

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University

More information

A Periodic Dynamic Load Balancing Method

A Periodic Dynamic Load Balancing Method 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation

More information

Improve Peer Cooperation using Social Networks

Improve Peer Cooperation using Social Networks Iprove Peer Cooperation using Social Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Noveber 5, 2007 Corresponding

More information

Adaptive Holistic Scheduling for In-Network Sensor Query Processing

Adaptive Holistic Scheduling for In-Network Sensor Query Processing Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,

More information

Distributed Multicast Tree Construction in Wireless Sensor Networks

Distributed Multicast Tree Construction in Wireless Sensor Networks Distributed Multicast Tree Construction in Wireless Sensor Networks Hongyu Gong, Luoyi Fu, Xinzhe Fu, Lutian Zhao 3, Kainan Wang, and Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University,

More information

BP-MAC: A High Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks

BP-MAC: A High Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks BP-MAC: A High Reliable Backoff Preable MAC Protocol for Wireless Sensor Networks Alexander Klein* Jirka Klaue Josef Schalk EADS Innovation Works, Gerany *Eail: klein@inforatik.uni-wuerzburg.de ABSTRACT:

More information

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

IN many interactive multimedia streaming applications, such

IN many interactive multimedia streaming applications, such 840 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 5, MAY 06 A Geoetric Approach to Server Selection for Interactive Video Streaing Yaochen Hu, Student Meber, IEEE, DiNiu, Meber, IEEE, and Zongpeng Li, Senior

More information

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se

More information

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones Advance Access publication on 24 February 2017 The British Coputer Society 2017. All rights reserved. For Perissions, please eail: journals.perissions@oup.co doi:10.1093/cojnl/bxx015 Fair Energy-Efficient

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

Minimax Sensor Location to Monitor a Piecewise Linear Curve

Minimax Sensor Location to Monitor a Piecewise Linear Curve NSF GRANT #040040 NSF PROGRAM NAME: Operations Research Miniax Sensor Location to Monitor a Piecewise Linear Curve To M. Cavalier The Pennsylvania State University University Par, PA 680 Whitney A. Conner

More information

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of

More information

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information

Effects of Interleaving on RTP Header Compression

Effects of Interleaving on RTP Header Compression Effects of Interleaving on RTP Header Copression Colin Perkins Jon Crowcroft Departent of Coputer Science University College London Gower Street London WCE 6BT Abstract We discuss the use of interleaving

More information

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3 2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses International Journal of Industrial Engineering & Production Research Septeber 03, Volue 4, Nuber 3 pp. 9-35 ISSN: 008-4889 http://ijiepr.iust.ac.ir/ Using Iperialist Copetitive Algorith in Optiization

More information

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design A Fast Multi-Obective Genetic Algorith for Hardware-Software Partitioning In Ebedded Syste Design 1 M.Jagadeeswari, 2 M.C.Bhuvaneswari 1 Research Scholar, P.S.G College of Technology, Coibatore, India

More information

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755

More information

Ravine Streams: Persistent Data Streams in Disruptive Sensor Networks

Ravine Streams: Persistent Data Streams in Disruptive Sensor Networks Ravine Streas: Persistent Data Streas in Disruptive Sensor Networks Mingsen Xu, Wen-Zhan Song Departent of Coputer Science, Georgia State University Atlanta, Georgia 333, USA Eail: {xu4@student.gsu.edu,

More information

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem Theoretical Analysis of Local Search and Siple Evolutionary Algoriths for the Generalized Travelling Salesperson Proble Mojgan Pourhassan ojgan.pourhassan@adelaide.edu.au Optiisation and Logistics, The

More information

Fair Resource Allocation for Heterogeneous Tasks

Fair Resource Allocation for Heterogeneous Tasks Fair Resource Allocation for Heterogeneous Tasks Koyel Mukherjee, Partha utta, Gurulingesh Raravi, Thangaraj Balasubraania, Koustuv asgupta, Atul Singh Xerox Research Center India, Bangalore, India 560105

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

A Hybrid Network Architecture for File Transfers

A Hybrid Network Architecture for File Transfers JOURNAL OF IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 6, NO., JANUARY 9 A Hybrid Network Architecture for File Transfers Xiuduan Fang, Meber, IEEE, Malathi Veeraraghavan, Senior Meber,

More information

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks An Ad Hoc Adaptive Hashing Technique for Non-Uniforly Distributed IP Address Lookup in Coputer Networks Christopher Martinez Departent of Electrical and Coputer Engineering The University of Texas at San

More information

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada

More information

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl. Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable

More information

A Generic Architecture for Programmable Trac. Shaper for High Speed Networks. Krishnan K. Kailas y Ashok K. Agrawala z. fkrish,

A Generic Architecture for Programmable Trac. Shaper for High Speed Networks. Krishnan K. Kailas y Ashok K. Agrawala z. fkrish, A Generic Architecture for Prograable Trac Shaper for High Speed Networks Krishnan K. Kailas y Ashok K. Agrawala z fkrish, agrawalag@cs.ud.edu y Departent of Electrical Engineering z Departent of Coputer

More information

λ-harmonious Graph Colouring Lauren DeDieu

λ-harmonious Graph Colouring Lauren DeDieu λ-haronious Graph Colouring Lauren DeDieu June 12, 2012 ABSTRACT In 198, Hopcroft and Krishnaoorthy defined a new type of graph colouring called haronious colouring. Haronious colouring is a proper vertex

More information

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage 216 IEEE 23rd International Conference on High Perforance Coputing A Low-Cost Multi-Failure Resilient Replication Schee for High Data Availability in Cloud Storage Jinwei Liu* and Haiying Shen *Departent

More information

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We

More information

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu

More information

COMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, August 23, 2004, 12:38 PM) PART III: CHAPTER ONE DIFFUSERS FOR CGH S

COMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, August 23, 2004, 12:38 PM) PART III: CHAPTER ONE DIFFUSERS FOR CGH S COPUTER GEERATED HOLOGRAS Optical Sciences 67 W.J. Dallas (onday, August 3, 004, 1:38 P) PART III: CHAPTER OE DIFFUSERS FOR CGH S Part III: Chapter One Page 1 of 8 Introduction Hologras for display purposes

More information

Multi Packet Reception and Network Coding

Multi Packet Reception and Network Coding The 2010 Military Counications Conference - Unclassified Progra - etworking Protocols and Perforance Track Multi Packet Reception and etwork Coding Aran Rezaee Research Laboratory of Electronics Massachusetts

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

Minimax Sensor Location in the Plane

Minimax Sensor Location in the Plane NSF GRANT #040040 NSF PROGRAM NAME: Operations Research Miniax Sensor Location in the Plane To M. Cavalier The Pennsylvania State University University Par, PA 680 Enrique del Castillo The Pennsylvania

More information

Dynamical Topology Analysis of VANET Based on Complex Networks Theory

Dynamical Topology Analysis of VANET Based on Complex Networks Theory BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 14, Special Issue Sofia 014 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.478/cait-014-0053 Dynaical Topology Analysis

More information

Virtual source-based minimum interference path multicast routing in optical virtual private networks

Virtual source-based minimum interference path multicast routing in optical virtual private networks Photon Netw Coun (2007) 13:19 30 DOI 10.1007/s11107-006-0012-7 ORIGINAL ARTICLE Virtual source-based iniu interference path ulticast routing in optical virtual private networks Jun-Mo Jo Suk-Jin Lee Kyung-Dong

More information

Resource Optimization for Web Service Composition

Resource Optimization for Web Service Composition Resource Optiization for Web Coposition Xia Gao, Ravi Jain, Zulfikar Razan, Ulas Kozat Abstract coposition recently eerged as a costeffective way to quickly create new services within a network. Soe research

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao

More information

A Comparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Problem

A Comparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Problem IE Vol. 7, No. 2, pp. 84-92, Septeber 2008. A Coparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Proble Ji Ung Sun School of Industrial and Managent Engineering Hankuk University

More information

Handling Indivisibilities. Notes for AGEC 622. Bruce McCarl Regents Professor of Agricultural Economics Texas A&M University

Handling Indivisibilities. Notes for AGEC 622. Bruce McCarl Regents Professor of Agricultural Economics Texas A&M University Notes for AGEC 6 Bruce McCarl Regents Professor of Agricultural Econoics Texas A&M University All or None -- Integer Prograing McCarl and Spreen Chapter 5 Many investent and probles involve cases where

More information

Minimum Delay Stream Routing and Content Caching in Hybrid Coalition Networks

Minimum Delay Stream Routing and Content Caching in Hybrid Coalition Networks Miniu Delay Strea Routing and Content Caching in Hybrid Coalition Networks Mostafa Dehghan, Anand Seethara, Ting He, Theodoros Salonidis Ji Kurose, Don Towsley, Bo Jiang, Raesh Sitaraan University of Massachussetts

More information

A Measurement-Based Model for Parallel Real-Time Tasks

A Measurement-Based Model for Parallel Real-Time Tasks A Measureent-Based Model for Parallel Real-Tie Tasks Kunal Agrawal 1 Washington University in St. Louis St. Louis, MO, USA kunal@wustl.edu https://orcid.org/0000-0001-5882-6647 Sanjoy Baruah 2 Washington

More information

Summary. Reconstruction of data from non-uniformly spaced samples

Summary. Reconstruction of data from non-uniformly spaced samples Is there always extra bandwidth in non-unifor spatial sapling? Ralf Ferber* and Massiiliano Vassallo, WesternGeco London Technology Center; Jon-Fredrik Hopperstad and Ali Özbek, Schluberger Cabridge Research

More information

End-to-End QoS Provisioning for Real-Time Video Streaming over SP-Driven P2P Networks Using Admission Control

End-to-End QoS Provisioning for Real-Time Video Streaming over SP-Driven P2P Networks Using Admission Control This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 29 proceedings End-to-End QoS Provisioning for Real-Tie Video

More information

Real-Time Detection of Invisible Spreaders

Real-Time Detection of Invisible Spreaders Real-Tie Detection of Invisible Spreaders MyungKeun Yoon Shigang Chen Departent of Coputer & Inforation Science & Engineering University of Florida, Gainesville, FL 3, USA {yoon, sgchen}@cise.ufl.edu Abstract

More information

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer Departent of Coputer Science and Engineering University of South Florida Tapa, FL 33620 Abstract -- The

More information

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH V. Atienza; J.M. Valiente and G. Andreu Departaento de Ingeniería de Sisteas, Coputadores y Autoática Universidad Politécnica de Valencia.

More information

Generating Mechanisms for Evolving Software Mirror Graph

Generating Mechanisms for Evolving Software Mirror Graph Journal of Modern Physics, 2012, 3, 1050-1059 http://dx.doi.org/10.4236/jp.2012.39139 Published Online Septeber 2012 (http://www.scirp.org/journal/jp) Generating Mechaniss for Evolving Software Mirror

More information

Performance Analysis of Exposed Terminal Effect in IEEE Ad Hoc Networks in Finite Load Conditions

Performance Analysis of Exposed Terminal Effect in IEEE Ad Hoc Networks in Finite Load Conditions Perforance Analysis of Exposed Terinal Effect in IEEE 80.11 Ad Hoc Networks in Finite Load Conditions Diitris Vassis 1, Georgios Korentzas 1 1 Dept. of Inforation and Counication Systes Engineering University

More information

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.5, Septeber 205 AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM Xie Yang and Cheng Wushan College of Mechanical Engineering,

More information

Trees. Linear vs. Branching CSE 143. Branching Structures in CS. What s in a Node? A Tree. [Chapter 10]

Trees. Linear vs. Branching CSE 143. Branching Structures in CS. What s in a Node? A Tree. [Chapter 10] CSE 143 Trees [Chapter 10] Linear vs. Branching Our data structures so far are linear Have a beginning and an end Everything falls in order between the ends Arrays, lined lists, queues, stacs, priority

More information

Optimal Route Queries with Arbitrary Order Constraints

Optimal Route Queries with Arbitrary Order Constraints IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL.?, NO.?,? 20?? 1 Optial Route Queries with Arbitrary Order Constraints Jing Li, Yin Yang, Nikos Maoulis Abstract Given a set of spatial points DS,

More information

Evaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS

Evaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS Evaluation of the Tiing Properties of Two Control Networs: CAN and PROFIBUS Max Mauro Dias Santos 1, Marcelo Ricardo Steer 2 and Francisco Vasques 3 1 UnilesteMG, CEP 35170-056, Coronel Fabriciano MG Brasil.

More information

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant

More information

Implementation of fast motion estimation algorithms and comparison with full search method in H.264

Implementation of fast motion estimation algorithms and comparison with full search method in H.264 IJCSNS International Journal of Coputer Science and Network Security, VOL.8 No.3, March 2008 139 Ipleentation of fast otion estiation algoriths and coparison with full search ethod in H.264 A.Ahadi, M.M.Azadfar

More information

MAC schemes - Fixed-assignment schemes

MAC schemes - Fixed-assignment schemes MAC schees - Fixed-assignent schees M. Veeraraghavan, April 6, 04 Mediu Access Control (MAC) schees are echaniss for sharing a single link. MAC schees are essentially ultiplexing schees. For exaple, on

More information

PERFORMANCE ANALYSIS OF THE UMTS SYSTEM FOR PACKET DATA TRANSFER OVER DEDICATED CHANNELS

PERFORMANCE ANALYSIS OF THE UMTS SYSTEM FOR PACKET DATA TRANSFER OVER DEDICATED CHANNELS PERFORMACE AALSIS OF THE MTS SSTEM FOR PACKET DATA TRASFER OVER DEDICATED CHAELS Manju Sarvagya, Ratna V. Raja Kuar Departent of Electronics and Electrical Counication Engineering Indian Institute of Technology,

More information

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH Kulapraote Prathuchai Geoinforatics Center, Asian Institute of Technology, 58 Moo9, Klong Luang, Pathuthani, Thailand.

More information

A wireless sensor network for visual detection and classification of intrusions

A wireless sensor network for visual detection and classification of intrusions A wireless sensor network for visual detection and classification of intrusions ANDRZEJ SLUZEK 1,3, PALANIAPPAN ANNAMALAI 2, MD SAIFUL ISLAM 1 1 School of Coputer Engineering, 2 IntelliSys Centre Nanyang

More information

The Flaw Attack to the RTS/CTS Handshake Mechanism in Cluster-based Battlefield Self-organizing Network

The Flaw Attack to the RTS/CTS Handshake Mechanism in Cluster-based Battlefield Self-organizing Network The Flaw Attack to the RTS/CTS Handshake Mechanis in Cluster-based Battlefield Self-organizing Network Zeao Zhao College of Counication Engineering, Hangzhou Dianzi University, Hangzhou 310018, China National

More information

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade

More information

A Discrete Spring Model to Generate Fair Curves and Surfaces

A Discrete Spring Model to Generate Fair Curves and Surfaces A Discrete Spring Model to Generate Fair Curves and Surfaces Atsushi Yaada Kenji Shiada 2 Tootake Furuhata and Ko-Hsiu Hou 2 Tokyo Research Laboratory IBM Japan Ltd. LAB-S73 623-4 Shiotsurua Yaato Kanagawa

More information

Distributed Multi-robot Work Load Partition In Manufacturing Automation

Distributed Multi-robot Work Load Partition In Manufacturing Automation th IEEE Conference on Autoation Science and Engineering Key Bridge Marriott, Washington DC, USA August 3-, Distributed Multi-robot Work Load Partition In Manufacturing Autoation Gira S Tewolde, Changhua

More information

EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B.

EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B. EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B. Girod1 1 Stanford University, USA 2 Qualco Inc., USA ABSTRACT We study

More information

Research Article A Game Theory Based Congestion Control Protocol for Wireless Personal Area Networks

Research Article A Game Theory Based Congestion Control Protocol for Wireless Personal Area Networks Journal of Sensors Volue 216, Article ID 61683, 13 pages http://dx.doi.org/1.11/216/61683 Research Article A Gae Theory Based Congestion Control Protocol for Wireless Personal Area Networks Chuang Ma,

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

Image Filter Using with Gaussian Curvature and Total Variation Model

Image Filter Using with Gaussian Curvature and Total Variation Model IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.

More information

Meta-heuristic Approaches for the Assembly Line Balancing Problem

Meta-heuristic Approaches for the Assembly Line Balancing Problem Proceedings of the 202 International Conference on Industrial Engineering and Operations Manageent Istanbul, Turey, July 3 6, 202 Meta-heuristic Approaches for the Assebly Line Balancing Proble Adil Bayasoğlu

More information

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang IEEE International Conference on ultiedia and Expo POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION Junjun Jiang, Ruiin Hu, Zhen Han, Tao Lu, and Kebin Huang National Engineering

More information