Research Progress for the Interest Control Protocol of Content-centric Networking

Size: px
Start display at page:

Download "Research Progress for the Interest Control Protocol of Content-centric Networking"

Transcription

1 Sensors & Transducers 2013 by IFSA Research Progress or the Interest Control Protocol o Content-centric Networing GAO QIANG, WANG WEIMING, ZHOU JINGJING Zhejiang Gongshang University o Institute o Networ and Communication Engineering, Hangzhou, , China gaoqiang@pop.zjgsu.edu.cn, wmwang@zjsu.edu.cn, zhoujingjing@mail.zjgsu.edu.cn Received: 28 April 2013 /Accepted: 19 July 2013 /Published: 31 July 2013 Abstract: Content-centric networing (CCN) brings a new change in today's Internet communication mode by addressing named-data instead o host locations. Another major eature is the possibility to added storage capabilities into the networ. Now, the ocus o this wor is on the design o a receiver-driven Interest control protocol or CCN. ICP realizes a window-based Interest low control, achieving ull eiciency and airness under proper parameters setting. In order to research ICP in-depth, in this paper, we summary the recent research progress o it. ICP is divided into several parts: content request process, bandwidth sharing model, content request aggregation, storage sharing model. We mae these process modeling, research and analysis in linear and binary tree networ topology separately, and conirm the accuracy o the models and its characteristics through the numerical analysis, inally give the research trend or ICP. Copyright 2013 IFSA. Keywords: Content centric networ (CCN), Interest control protocol (ICP). 1. Introduction The design principle and structure o today's Internet originated in the in the 1960s and 70s. The goal o networ design is to solve the shared hardware resources. Thereore, the main purpose o the communication is to connect the two hosts, and the need to determine the speciic location o a device. However, with the rapid development o inormation technology, computer hardware costs a signiicant reduction in shared hardware resources demand have aded, and the subject o networ applications has turned to text messages and video content, and content services is slowly becoming a main networ service body. The content o the Internet service has been more attention. In content services networ, people do not care about what computer to provide content inormation, and is only concerned about the speed o access to the content as well as the reliability and security o the content. So, content service has become the main networ services. Under this premise, people do not care which computer provides the content inormation, but only concern about the speed o access to the content as well as the reliability and security o the content. However, the currently widely used in the Internet's TCP / IP is still a Host-to-Host communication model, this model is obvious shortcoming to post and access to inormation-based Internet. In this case, the point-to-point (p2p) technology and content delivery networ (CDN) technology, to some extent, ease the user's content / inormation sharing needs. However, any content delivery mechanism in the current networing is not completely overcome the deects o the underlying mechanism, resulting in a waste o resources, and requires a complex mapping o the content and "position". Article number P_

2 In order to adapt to this change in demand, new networ architecture should be established. Thereore, the Inormation Center Networ (ICN, Inormation Centric Networing) is proposed, and its goal is to solve all the problems existing in the internet today. It has been proved that ICN is better able to solve the various problems in today's Internet. In these uture networs research projects, Palo Alto research Center s (PARC) Content-centric networing (CCN) [1] has more advantages. Currently, many research institutions are involved in the content-centric networ architecture, Such as UCLA, and Bell Labs [7], Europe CONNECT project team [2] and so on. The rest o this article is organized as ollows. In Section 2 describes the CCN architecture, the dierence between CCN and the TCP / IP protocol. In Section 3 describes the research progress o the ICP protocol requests rom the research ramewor and content transmission bandwidth sharing, shared storage and iltering o the routing nodes several processes to describe. In Section 4 is a summary o the thesis. 2. CCN System Introduction The basic meaning o the Content-centric networing is that the demand o the entire networ is content, not the host. It undamentally changed the IP pacet s encapsulation structure and addressing mode, the pacet header no longer identiies the address, but the content name. CCN communication is driven by the consumers o data. There are two CCN pacet types [4], Interest and Data (Fig. 1). Fig. 1. CCN pacet types. The entire inormation transmission process is that the request pacet deines the title o the contents contained in a pacet and the pacet is transmitted to all directions, then the device o an adjacent node which can provide the requested content will sent data to the requesting node through the content data pacage. It can be seen that the CCN entire process is no longer concerned about the location, but quicly get the most rom the neighboring nodes in a minimum price. So, CCN provides a new protocol stac (Fig. 2). Fig. 2 compares the IP and CCN protocol stacs. CCN architecture shape and TCP / IP networ is very similar, the lower layer protocols are designed or adaptation o the underlying physical lins and communication, the upper layer protocols are designed to correspond to the related application. The main dierence is that the CCN using the Content chuns instead o the IP and using named data instead the naming o physical entities. IP protocol's success lies in its relaxed requirements or second layer protocol, CCN inherited it, and CCN can be implemented in any o the underlying protocols, can even architecture above the IP layer. In addition, the content-centric networ routing node built storage unction used to cache data pacets which can speed up access to other users and reduce networ traic. Fig. 2. The compare between TCP/IP and CCN. The ICP protocol [5] o CCN describes the entire inormation communication process: air sharing o the transmission, and the routing node storage and iltration process rom the transmission o the request pacet, the bandwidth on the lin. We will describe the progress o the current study as ollows. 3. ICP Introduction The CCN s ICP protocol [5] describes the entire inormation communication process. The client sends a request pacet, transmitted via the lin, reaches a routing node, the routing node o the query sequence are sequentially processed (the detailed procedure as ollowed), then sends to uplin by a node (in CCN, only the request pacets are routed), until retrievals needed data pacets, then the pacet request reverse transmission path o the pacet routing, service receiving end. The ICP process is divided into several parts: content request process, lin bandwidth sharing transmission process, storage and iltration process o the routing nodes. For the beneit o research, we model these sub-processes, and discuss the ICP s availability, eiciency and airness based on linear and binary tree networ topologies Node Model Analysis Interest Pacet Routing Analysis From Fig. 3, the typical CCN node model includes the contents o memory (CS), pending requests table (PIT) and orward orwarding (FIB). 88

3 CS is similar to IP routers cache, but uses dierent caching strategies. Because each o the IP pacets belong to a single point-to-point session, no value to the other session, so it uses the MRU replacement strategy which empty the inormation stored ater the completion o a session. CCN each pacet is selidentity and sel-validation, so there is also value or other users, CCN will uses the LRU or LFU replacement policy to maximize store important inormation, in order to reduce the content download delay and networ bandwidth. PIT records the uplin routing path o request pacets, so the content data pacage can be bactrac spread bac to the requesting node according to PIT recorded inormation trac. When the content requested arrives at the receiving node, PIT will delete this entry. FIB and the IP router s processing mechanism are similar, but it can be orwarded to the plurality o directions at the same time request. When an Interest pacet arrives on some ace, a longest-match looup is done on its Content Name. The index structure used or looup is ordered so that a Content Store match will be preerred over a PIT match which will be preerred over a FIB match. The speciic operation is as ollows: Fig. 3. CCN orwarding engine model. I CS contains a request pacet, it will directly sends the corresponding content to the requested port, and discards the request pacet, otherwise it will continue to query the PIT. Otherwise, i PIT contains entries associated with the content name, it will let request port added to the request port list, and discards the request pacet, otherwise it will continue to query the FIB. Otherwise, i FIB contains entries associated with content name, it will orward the pacet to the next CCN node in accordance with the instructions o the FIB. I the rest o the port is not empty, then it will orward request to all the rest, and ormat new list o entries and ports in the FIB. I there is no match or the Interest it is discarded (this node does not have any matching data and does not now how to ind any) Data Pacet Routing Analysis Data pacet processing is relatively simple since Data does not require routing, ollowed by only PIT port records the request data pacet transmission trajectory to reach the initial client. When a pacet arrives routing nodes, the longest match its content name query. Described in the PIT match the pacet ater the request when the CS match the pacet duplication, to remove it; PIT port o the FIB matching the node does not match, the pacet is unsolicited delete it; pacet orwarding path, request the end through the node to accept Assumptions and Notation For the various parts o the ICP protocol, we reerence [5, 7, 8] and summarize all o the models. The main assumptions are the ollowing: 1. M dierent content items are equally partitioned in K classes o popularity, i.e. is requested with probability q, 1. We assume a Zip popularity distribution, q c K, c ( 1 1/ ), with Content items are divided into chuns (P size) and the content size distribution is geometric with average σ chuns. 89

4 3. N networ nodes (or levels or tree topologies). Node i is equipped with a cache o size xi chuns. 4. The request arrival process is modeled as a Marov Modulated Rate Process (MMRP) [3] and the process is according to a Poisson process o intensity q 5. We deine virtual round trip time o class, VRTT, is similar to the round trip time or TCP connections in IP networs. It describes the average time o a chun to send the request and is accepted. than once or a duration equal to the timer as in Fig. 4 (b). Interest timer value: τ should be set larger than the minimum networ delay, and a minimum τ value is necessary to guarantee high utilization o the available bandwidth. In the case o variable τ, ICP maintains round trip delay estimates at every data pacet reception. Each low adapts its timer τ according to RTT ( RTT RTT ), 0.5 (2) min max min N i1 VRTT R (1 p ( i)) p ( j), 1,..., K i i1 j1 (1) VRTT is deined as a weighted sum o the round trip delays Ri associated to node i, and the weights are related to the stationary hit probabilities 1 p ( i) Content Request Process Notation Fig. 4. Linear (a) and binary tree (b) topologies with bandwidth-limited down-lin Content Request Aggregation The content request process is structured in two levels, content and chun. The process is modeled as a Marov Modulated Rate Process (MMRP): the request or content items is according to a Poisson process o intensity: q. A request or content is exactly the content o the irst chun, and when a chun is received, the other new chun is going to sent until the contents o the last chun. ICP realizes a window-based Interest low control, and it uses the AIMD (Additive Increase Multiplicative Decrease) mechanism to adapt the Interest window size to attain the maximum available rate allowed on the networ path. Interest window increase: W is increased by η/w at Data pacet reception. Interest window decrease: The protocol reacts by multiplying W by a decrease actor β< 1, no more CCN s a basic eature o blocing requests lood is the aggregation, which it can prevent the transmitted request or the same data again by the node o the PIT records pending requests chun trajectory. PIT time window Δ: the value is used to limit the number o pacets in its pending request. The larger o the value, the more the number o ilter out a request pacet; smaller the value, means that there are more unnecessary requests continue to be routed. The request aggregation clearly impacts the miss rate o a given cache. In act, when a request chun arrives at a node, i the corresponding chun is stored in the node, it will generate a hit, otherwise it generates a lost. For the latter, the request is iltered only i a previous request or the same chun has been emitted and the chun has not been received yet. Given the request process, the iltering probability associated to class at the irst hop is, 1 b pilt, (1) 1,..., K 1 (11/ ) b b e The proo is reported in [11]. (3) 90

5 3.5. Bandwidth Sharing Model In CCN, a receiver can download data rom multiple nodes and share bandwidth with other concurrent transers. User-perceived perormance depends on the parallel download bandwidth sharing. A generally accepted airness objective is max-min, which can achieve rate equalization. Every route i is characterized by a number o parallel transers, N i, sharing the same route and thereore the limited bandwidth. N i is a random process that varies according to the demand λ and the service rate each transer in progress gets. Ni is a birth and death Marov process, birth rate: ( i1) ( i), ( (0) ) death rate: n ()/( i ) i ( i1) ( i) denotes the rate o the Poisson process o content requests satisied by node i, under the assumption o a MMRP miss process o intensity () i at node i. The death rate, ni ()/( i ), is determined by the max-min air shared bandwidth () i in bps associated to each o the ni content transers in parallel over route i. orwarding tables are implemented by Carzaniga et al. in content-based networing simulator [6]. For the case o a single node, we present the experimental case is that a population o M = content items, and K = 400 classes, each one with m = 50 items. Content items are split in chuns o 10 B each. Users generate content requests according to a Poisson process o intensity λ= 40 content/sec, and the interest transmission window size is W = 1. The cache o size x = chuns (2 GBs) which implements the LRU replacement policy. Each cache is assumed to be initially empty, while statistics are collected in steady state only Storage Sharing Model The research about storage sharing model is based on above three models: content request process, content request aggregation and bandwidth sharing model, so we validate numerical analysis through the storage sharing model. Except 3.2 assumptions, we give the others as ollows: 1. K popularity classes with the same number o content items m = M/K in each one. 2. Non-unitary content size (σ) Storage Model Analysis at Node 1 We irst analyze the irst node which means the irst rom the content request point. Given a MMRP request arrival process with intensity λ, and average content size σ, be x > 0the cache size in number o chuns, then the stationary miss probability or chuns o class is, 1/ g c m (1 ) (4) 1 1 We use an ad-hoc C++ event-driven simulator[8] to conirm the accuracy o the model and assume a simple transport protocol which it uses a ixed window size or chun requests as in CCN. Nodes Fig. 5. Miss probability as a unction o class popularity (a); miss rate with and without request iltering or α= 2 (b) [8]. In Fig. 5 (a) [8] we can see that the greater the value o α, the miss rate is lower, and or high popular level (1 is the highest) o the content, it s miss rate is low, while the lower popular Level o the content, it s miss rate is getting higher and higher, almost, that is certainly lost. Fig 5 (b) [8] shows the miss rate with request iltering is lower than without. Through these two simulation graphics, we can conirm the accuracy o the eq.4 or predicting the probability o loss. 91

6 Storage Model Analysis at Networ Topologies In this section we consider the topologies reported Fig. 4, in order to derive the stationary miss probabilities p () i at hop i > 1, we need the ollowing auxiliary result. Given a MMRP request arrival process with rate λ(i) and popularity distribution: q () i i1 p ( j) q / K l1 ( ), 1,... p j q K j1 l1 j1 l l and deined Si(0, t) the number o dierent chuns th requested in the open interval (0, t] at the i node. Be μ(i) the miss rate at node i () i () i p () i q () i, then it holds [ S (0, t)] () i 1 t ( i1) (5) 1/ gi ( ) lim i 1 c m (1 ) t i.e. gi ()/ g ( i 1)/ () i, being g(1) g.the proo is reported in [9] Miss Rate Characterization without Request Aggregation Given a cascade o N caches as in Fig. 4 (a) and a MMRP request arrival process, then 1 < i N it holds gi () log ( ) ( ) log (1) p i i1 p l g(1) l1 p i1 p()log l p(1) l1 (6) Similarly, one can study the binary tree topology in Fig. 4 (b), that has no dierence with the line topology in the homogeneous case expect that λ(i)=2μ(i-1). Given a homogeneous binary tree with 2 N 1caches (that is with N levels) as in Fig. 4(b) and a MMRP requests arrival process, then 1 < i N it holds p () i p (1) p () i i1 p () 1 1 l p ilt, (1) l (8) For the topology in Fig. 4 (b) the request aggregation can tae place at several hops depending on traic and cache parameters. Given a binary tree with 2 N 1 caches (that is with N levels) as in Fig. 4 (b) and a MMRP requests arrival process and an aggregation timescale, then it holds 1 b ( i) p ilt, () i, 1,..., N 1 (11/ ) b ( i) (9) with / m 2 ( i 1)/ m b (1) e, b ( i) e, i 1. (1)(1, (1)) 1 p pilt i i () i 2 ( i1) p ()(1 i pilt, ()) i i i 1 (10) The proo is provided in [9]. For the case o topology, we present the experimental case is that N = 3 levels binary tree, where data is stored at the root o the tree. Each lin has the same capacity o 10 Gbps and the same round trip delay equal to 2 ms. The Zip parameter α= 2, and chun size is 10 B. Other parameters are same to the above case. Fig. 6 compares the miss probabilities at dierent nodes (rom the 1st to the 3rd level) without request aggregation. The comparison summarizes the good match between model predictions Eq.(4) at level i = 1, Eq.(6) at level i > 1. we can be see that the requests or content items o the most popular class are almost completely served by caches o irst nodes, so the miss probability or class = 1 is nearly 1 at i>1. Content items o class 2 are mainly cached at irst and second level, whereas less popular classes, represented in the queue o the curves, are very rarely cached as hardly requested. i1 () igi () log p ( i) p ( l)log p (1) i1 l1 ( i1) g(1) l1 p ()log l p (1) (7) Miss Rate Characterization with Request Aggregation Given a cascade o N caches as in Fig.4 (a), a MMRP request arrival process and an aggregation timescale, then it holds Fig. 6. Miss probability at dierent levels or binary tree topology, with no iltering [8]. 92

7 4. Conclusions Content-centric networing is the research ocus o the next generation networ. In this paper, we summary the recent research progress o ICP. We mae these process modeling, research and analysis in linear and binary tree networ topology separately, and conirm the accuracy o the models and its characteristics through the numerical analysis, inally give the research trend or ICP. Through the research, we ind that ICP protocol s a signiicant eature is the storage unctions embedded in the networ, it can help reduce content download latency and networ bandwidth usage greatly improve bandwidth utilization perormance. Another is that CCN transport provides Disruption Tolerant Networing. The multipoint nature o data retrieval by Interest provides lexibility to maintain communication in highly dynamic environments. Any node with access to multiple networs can serve as a content router between them. These characteristics do provide eective help to resolve the current Internet problems. But, CCN technology is still in its beginning stages. So, the ICP protocol is not very mature, and the protocol s process and topology are relatively simple, and the protocol traic control problem also needs more in-depth study. The next step o the research is continues to improve the ICP protocol, and over a period o time it will also be the hot issues o the next generation networ research. Acnowledgements This wor has been partially unded by National "973" project, under grant number 2012CB315902, and by NSFC (Natural Science Foundation o China), under grant number , and by Youth Science Fund o NSFC, under grant number , and by Natural Science Foundation o Zhejiang, under grant number Y , and by Public Interest Research social development projects, under grant number 2012C Reerences [1]. Project CCNxTM. [2]. CONNECT [3]. T. E. Stern and A. I. Elwalid, Analysis o separable Marov-modulated rate models or inormationhandling systems, Advances in Applied Probability, Vol. 23, No. 1, 1991, pp [4]. Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nicholas H. Briggs, Rebecca L. Braynard, Networing Named Content, in Proceedings o the ACM CoNEXT, [5]. Giovanna Caroiglio, Massimo Gallo, Luca Muscariello, ICP: Design and Evaluation o an Interset Control Protocol or Content-Centric Networing. in Proceedings o the INFOCOM Worshop, [6]. A. Carzaniga, M. Rutherord, and A. Wol, A routing scheme or content-based networing, in Proceedings o the INFOCOM 04, [7]. Giovanna Caroiglio, Massimo Gallo, Luca Muscariello. Bandwidth and Storage Sharing Perormance in Inormation Centric Networing, in Proceedings o the ACM SIGCOMM Worshop (ICN 11), [8]. Giovanna Caroiglio, Massimo Gallo, Luca Muscariello, Diego Perino, Modeling data transer in content-centric networing, in Proceedings o the (ITC23), [9]. G. Caroiglio, M. Gallo, L. Muscariello, and D. Perino, Modeling data transer in content-centric networing (extended version), in Research report, available at /muscariello, Copyright, International Frequency Sensor Association (IFSA). All rights reserved. ( 93

Bandwidth and Storage Sharing Performance in Information Centric Networking

Bandwidth and Storage Sharing Performance in Information Centric Networking Bandwidth and Storage Sharing Performance in Information Centric Networking Giovanna Carofiglio Bell Labs, Alcatel-Lucent giovanna.carofiglio@alcatel-lucent.com Massimo Gallo Orange Labs, France Telecom

More information

ICP: Design and Evaluation of an Interest Control Protocol for Content-Centric Networking

ICP: Design and Evaluation of an Interest Control Protocol for Content-Centric Networking ICP: Design and Evaluation of an Interest Control Protocol for Content-Centric Networking Giovanna Carofiglio, Massimo Gallo, Luca Muscariello Bell Labs, Alcatel-Lucent, first.last@alcatel-lucent.com,

More information

Efficient Mobile Content-Centric Networking. Using Fast Duplicate Name Prefix Detection. Mechanism

Efficient Mobile Content-Centric Networking. Using Fast Duplicate Name Prefix Detection. Mechanism Contemporary Engineering Sciences, Vol. 7, 2014, no. 24, 1345-1353 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49166 Efficient Mobile Content-Centric Networking Using Fast Duplicate

More information

Modeling Data Transfer in Content-Centric Networking

Modeling Data Transfer in Content-Centric Networking ing Data Transfer in Content-Centric Networking Giovanna Carofiglio, Massimo Gallo, Luca Muscariello and Diego Perino. Bell Labs, Alcatel-Lucent, France, Orange Labs, France Telecom, France first.last@alcatel-lucent.com,

More information

CCTCP: A Scalable Receiver-driven Congestion Control Protocol for Content Centric Networking

CCTCP: A Scalable Receiver-driven Congestion Control Protocol for Content Centric Networking CCTCP: A Scalable Receiver-driven Congestion Control Protocol for Content Centric Networking Lorenzo Saino, Cosmin Cocora and George Pavlou Communications and Information Systems Group Department of Electrical

More information

Live Streaming with Content Centric Networking

Live Streaming with Content Centric Networking 2012 Third International Conference on Networking and Distributed Computing Live Streaming with Content Centric Networking Hongfeng Xu 2,3, Zhen Chen 1,3, Rui Chen 2,3, Junwei Cao 1,3 1 Research Institute

More information

Consumer driven Adaptive Rate Control for Real-time Video Streaming in CCN/NDN

Consumer driven Adaptive Rate Control for Real-time Video Streaming in CCN/NDN Consumer driven Adaptive Rate Control for Real-time Video Streaming in CCN/NDN Takahiro YONEDA, Ryota OHNISHI, Eiichi MURAMOTO(Presenter),, Panasonic Corporation Jeff Burke, UCLA Contact: muramoto.eiichi@jp.panasonic.com

More information

Optimized Vehicular Traffic Flow Strategy using Content Centric Network based Azimuth Routing

Optimized Vehicular Traffic Flow Strategy using Content Centric Network based Azimuth Routing , pp.80-84 http://dx.doi.org/10.14257/astl.2014.64.20 Optimized Vehicular Traffic Flow Strategy using Content Centric Network based Azimuth Routing ByungKwan Lee 1, EunHee Jeong 2 1 Department of Computer,

More information

IN recent years, the amount of traffic has rapidly increased

IN recent years, the amount of traffic has rapidly increased , March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed

More information

Cache Replacement Strategies for Scalable Video Streaming in CCN

Cache Replacement Strategies for Scalable Video Streaming in CCN Cache Replacement Strategies for Scalable Video Streaming in CCN Junghwan Lee, Kyubo Lim, and Chuck Yoo Dept. Computer Science and Engineering Korea University Seoul, Korea {jhlee, kblim, chuck}@os.korea.ac.kr

More information

Optimal Cache Allocation for Content-Centric Networking

Optimal Cache Allocation for Content-Centric Networking Optimal Cache Allocation for Content-Centric Networking Yonggong Wang, Zhenyu Li, Gaogang Xie Chinese Academy of Sciences Gareth Tyson, Steve Uhlig QMUL Yonggong Wang, Zhenyu Li, Gareth Tyson, Steve Uhlig,

More information

MATRIX ALGORITHM OF SOLVING GRAPH CUTTING PROBLEM

MATRIX ALGORITHM OF SOLVING GRAPH CUTTING PROBLEM UDC 681.3.06 MATRIX ALGORITHM OF SOLVING GRAPH CUTTING PROBLEM V.K. Pogrebnoy TPU Institute «Cybernetic centre» E-mail: vk@ad.cctpu.edu.ru Matrix algorithm o solving graph cutting problem has been suggested.

More information

TO meet the increasing bandwidth demands and reduce

TO meet the increasing bandwidth demands and reduce Assembling TCP/IP Packets in Optical Burst Switched Networks Xiaojun Cao Jikai Li Yang Chen Chunming Qiao Department o Computer Science and Engineering State University o New York at Bualo Bualo, NY -

More information

Experimental Evaluation of Memory Management in Content-Centric Networking

Experimental Evaluation of Memory Management in Content-Centric Networking Experimental Evaluation of Memory Management in Content-Centric Networking Giovanna Carofiglio, Vinicius Gehlen, and Diego Perino Bell Labs, Alcatel-Lucent, France, first.last@alcatel-lucent.com Abstract

More information

ITU - Telecommunication Standardization Sector. G.fast: Far-end crosstalk in twisted pair cabling; measurements and modelling ABSTRACT

ITU - Telecommunication Standardization Sector. G.fast: Far-end crosstalk in twisted pair cabling; measurements and modelling ABSTRACT ITU - Telecommunication Standardization Sector STUDY GROUP 15 Temporary Document 11RV-22 Original: English Richmond, VA. - 3-1 Nov. 211 Question: 4/15 SOURCE 1 : TNO TITLE: G.ast: Far-end crosstalk in

More information

Scheduling in Multihop Wireless Networks without Back-pressure

Scheduling in Multihop Wireless Networks without Back-pressure Forty-Eighth Annual Allerton Conerence Allerton House, UIUC, Illinois, USA September 29 - October 1, 2010 Scheduling in Multihop Wireless Networks without Back-pressure Shihuan Liu, Eylem Ekici, and Lei

More information

A Proposed Approach for Solving Rough Bi-Level. Programming Problems by Genetic Algorithm

A Proposed Approach for Solving Rough Bi-Level. Programming Problems by Genetic Algorithm Int J Contemp Math Sciences, Vol 6, 0, no 0, 45 465 A Proposed Approach or Solving Rough Bi-Level Programming Problems by Genetic Algorithm M S Osman Department o Basic Science, Higher Technological Institute

More information

Insensitive Traffic Splitting in Data Networks

Insensitive Traffic Splitting in Data Networks Juha Leino and Jorma Virtamo. 2005. Insensitive traffic splitting in data networs. In: Proceedings of the 9th International Teletraffic Congress (ITC9). Beijing, China, 29 August 2 September 2005, pages

More information

Named Data Networking for 5G Wireless

Named Data Networking for 5G Wireless Named Data Networking for 5G Wireless Edmund Yeh Electrical and Computer Engineering Northeastern University New York University January 27, 2017 Overview NDN: a major information-centric networking architecture

More information

A Markov Model of CCN Pending Interest Table Occupancy with Interest Timeout and Retries

A Markov Model of CCN Pending Interest Table Occupancy with Interest Timeout and Retries A Markov Model of CCN Pending Interest Table Occupancy with Interest Timeout and Retries Amuda James Abu, Brahim Bensaou and Ahmed M. Abdelmoniem The Department of Computer Science and Engineering The

More information

Research on Image Splicing Based on Weighted POISSON Fusion

Research on Image Splicing Based on Weighted POISSON Fusion Research on Image Splicing Based on Weighted POISSO Fusion Dan Li, Ling Yuan*, Song Hu, Zeqi Wang School o Computer Science & Technology HuaZhong University o Science & Technology Wuhan, 430074, China

More information

Scaled VIP Algorithms for Joint Dynamic Forwarding and Caching in Named Data Networks

Scaled VIP Algorithms for Joint Dynamic Forwarding and Caching in Named Data Networks 1896 1920 1987 2006 Scaled VIP Algorithms for Joint Dynamic Forwarding and Caching in Named Data Networks Ying Cui Shanghai Jiao Tong University, Shanghai, China Joint work with Fan Lai, Feng Qiu, Wenjie

More information

Applying fair queueing and traffic shaping for Internet applications on top of ATM The LB_SCFQ algorithm

Applying fair queueing and traffic shaping for Internet applications on top of ATM The LB_SCFQ algorithm Applying air queueing and traic shaping or Internet applications on top o ATM The LB_SCFQ algorithm Abstract Fair queueing mechanisms give very promising results or ATM networks. Combining a air queueing

More information

MCBS: Matrix Computation Based Simulator of NDN

MCBS: Matrix Computation Based Simulator of NDN JOURNAL OF COMPUTERS, VOL. 9, NO. 9, SEPTEMBER 2014 2007 MCBS: Matrix Computation Based Simulator of NDN Xiaoke Jiang, Jun Bi, You Wang Institute for Network Sciences and Cyberspace, Tsinghua University

More information

Mobile Robot Static Path Planning Based on Genetic Simulated Annealing Algorithm

Mobile Robot Static Path Planning Based on Genetic Simulated Annealing Algorithm Mobile Robot Static Path Planning Based on Genetic Simulated Annealing Algorithm Wang Yan-ping 1, Wubing 2 1. School o Electric and Electronic Engineering, Shandong University o Technology, Zibo 255049,

More information

Content Searching Scheme with Distributed Data Processing Service in Content Centric Networking

Content Searching Scheme with Distributed Data Processing Service in Content Centric Networking J. Basic. Appl. Sci. Res., 4(1)160-165, 2014 2014, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com Content Searching Scheme with Distributed Data Processing

More information

Adaptive Routing Forwarding Strategy Based on Neural Network Algorithm

Adaptive Routing Forwarding Strategy Based on Neural Network Algorithm Adaptive Routing Forwarding Strategy Based on Neural Networ Algorithm Chao Ma, Mingchuan Zhang, Fenghua Zhang, Yaming Chen, Xinlu Wang, Qianpeng Li Abstract With the profound changes in global digital

More information

Method estimating reflection coefficients of adaptive lattice filter and its application to system identification

Method estimating reflection coefficients of adaptive lattice filter and its application to system identification Acoust. Sci. & Tech. 28, 2 (27) PAPER #27 The Acoustical Society o Japan Method estimating relection coeicients o adaptive lattice ilter and its application to system identiication Kensaku Fujii 1;, Masaaki

More information

On the Double-Faced Nature of P2P Traffic

On the Double-Faced Nature of P2P Traffic On the Double-Faced Nature o P2P Traic Raaele Bolla, Marco Canini, Riccardo Rapuzzi, Michele Sciuto DIST - Department o Communication, Computer and System Sciences, University o Genoa Via Opera Pia 13,

More information

Reliable Mobile IP Multicast Based on Hierarchical Local Registration

Reliable Mobile IP Multicast Based on Hierarchical Local Registration Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Reliable Mobile IP Multicast Based on Hierarchical Local Registration Huanming ZHANG, * Quanlong GUAN, Zi Zhao ZHU, Weiqi

More information

Shortest-hop Based Reliable Network Multicast

Shortest-hop Based Reliable Network Multicast Shortest-hop Based Reliable Network Multicast K.L. Eddie Law, Daniel Siu Ryerson University, Toronto, Canada. Email: eddie@ee.ryerson.ca IBM Canada, Toronto, Canada. Email: siud@sympatico.ca Absact Although

More information

CS4/MSc Computer Networking. Lectures 4-5 Transport layer protocols TCP/UDP automatic repeat request

CS4/MSc Computer Networking. Lectures 4-5 Transport layer protocols TCP/UDP automatic repeat request S4/MSc omputer Networking Lectures 4-5 Transport layer protocols TP/UDP automatic repeat request omputer Networking, opyright University o Edinburgh 005 Transport services and protocols provide logical

More information

Piecewise polynomial interpolation

Piecewise polynomial interpolation Chapter 2 Piecewise polynomial interpolation In ection.6., and in Lab, we learned that it is not a good idea to interpolate unctions by a highorder polynomials at equally spaced points. However, it transpires

More information

Classification Method for Colored Natural Textures Using Gabor Filtering

Classification Method for Colored Natural Textures Using Gabor Filtering Classiication Method or Colored Natural Textures Using Gabor Filtering Leena Lepistö 1, Iivari Kunttu 1, Jorma Autio 2, and Ari Visa 1, 1 Tampere University o Technology Institute o Signal Processing P.

More information

A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI

A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI 1 Yongxian SONG, 2 Rongbiao ZHANG and Fuhuan

More information

Decision Support Systems for E-Purchasing using Case-Based Reasoning and Rating Based Collaborative Filtering

Decision Support Systems for E-Purchasing using Case-Based Reasoning and Rating Based Collaborative Filtering Decision Support Systems or E-Purchasing using Case-Based Reasoning and Rating Based Collaborative Filtering ABSTRACT The amount o trade conducted electronically has grown dramatically since the wide introduction

More information

Publisher Mobility Support in Content Centric Networks

Publisher Mobility Support in Content Centric Networks Publisher Mobility Support in Content Centric Networks Dookyoon Han, Munyoung Lee, Kideok Cho, Ted Taekyoung Kwon, and Yanghee Choi School of Computer Science and Engineering Seoul National University,

More information

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and

More information

Networking Named Content

Networking Named Content Networking Named Content Van Jacobson Diana K. Smetters James D. Thorton Machael F. Plass Nicholas H. Briggs Rebecca L. Braynard Presented by: Vladislav Perelman Advanced Networking Seminar Jacobs University

More information

CSE3213 Computer Network I

CSE3213 Computer Network I SE33 omputer Network I Service Model, Error ontrol, Flow ontrol, and Link Sharing (h. 5. 5.3. and 5.7.) ourse page: http://www.cse.yorku.ca/course/33 Slides modiied om lberto Leon-Garcia and Indra Widjaja

More information

Scaled VIP Algorithms for Joint Dynamic Forwarding and Caching in Named Data Networks

Scaled VIP Algorithms for Joint Dynamic Forwarding and Caching in Named Data Networks Scaled VIP Algorithms for Joint Dynamic Forwarding and Caching in Named Data Networks Fan Lai, Feng Qiu, Wenjie Bian, Ying Cui Shanghai Jiao Tong University Shanghai, China Edmund Yeh Northeastern University

More information

First Video Streaming Experiments on a Time Driven Priority Network

First Video Streaming Experiments on a Time Driven Priority Network First Video Streaming Experiments on a Driven Priority Network Mario Baldi and Guido Marchetto Department o Control and Computer Engineering Politecnico di Torino (Technical University o Torino) Abstract

More information

Compressed Sensing Image Reconstruction Based on Discrete Shearlet Transform

Compressed Sensing Image Reconstruction Based on Discrete Shearlet Transform Sensors & Transducers 04 by IFSA Publishing, S. L. http://www.sensorsportal.com Compressed Sensing Image Reconstruction Based on Discrete Shearlet Transorm Shanshan Peng School o Inormation Science and

More information

An Efficient Configuration Methodology for Time-Division Multiplexed Single Resources

An Efficient Configuration Methodology for Time-Division Multiplexed Single Resources An Eicient Coniguration Methodology or Time-Division Multiplexed Single Resources Benny Akesson 1, Anna Minaeva 1, Přemysl Šůcha 1, Andrew Nelson 2 and Zdeněk Hanzálek 1 1 Czech Technical University in

More information

3-D TERRAIN RECONSTRUCTION WITH AERIAL PHOTOGRAPHY

3-D TERRAIN RECONSTRUCTION WITH AERIAL PHOTOGRAPHY 3-D TERRAIN RECONSTRUCTION WITH AERIAL PHOTOGRAPHY Bin-Yih Juang ( 莊斌鎰 ) 1, and Chiou-Shann Fuh ( 傅楸善 ) 3 1 Ph. D candidate o Dept. o Mechanical Engineering National Taiwan University, Taipei, Taiwan Instructor

More information

TCP/IP protocol suite

TCP/IP protocol suite TCP/IP protocol suite The TCP/IP protocol suite was developed prior to the OSI model. Therefore, the layers in the TCP/IP protocol suite do not match exactly with those in the OSI model. The original TCP/IP

More information

Forwarding, Caching and Congestion Control in Named Data Networks

Forwarding, Caching and Congestion Control in Named Data Networks Forwarding, Caching and Congestion Control in Named Data Networs Edmund Yeh Northeastern University eyeh@ece.neu.edu Ran Liu Northeastern University liu.ran@husy.neu.edu Tracey Ho Speedy Pacets Inc. tracey@speedypacets.com

More information

CCN & Network Coding. Cedric Westphal Huawei and UCSC

CCN & Network Coding. Cedric Westphal Huawei and UCSC CCN & Network Coding Cedric Westphal Huawei and UCSC ICN & Network Coding - RFC7933 9.5. Network Coding for Video Distribution in ICN An interesting research area for combining heterogeneous sources is

More information

Cache Less for More in Information- Centric Networks W. K. Chai, D. He, I. Psaras and G. Pavlou (presenter)

Cache Less for More in Information- Centric Networks W. K. Chai, D. He, I. Psaras and G. Pavlou (presenter) Cache Less for More in Information- Centric Networks W. K. Chai, D. He, I. Psaras and G. Pavlou (presenter) Department of Electronic & Electrical Engineering University College London London WC1E 6EA United

More information

Video Conferencing with Content Centric Networking

Video Conferencing with Content Centric Networking Video Conferencing with Content Centric Networking Kai Zhao 1,2, Xueqing Yang 1, Xinming Ma 2 1. Information Engineering College, North China University of Water Rescources and Electric Power,Zhengzhou,china

More information

Joint Congestion Control and Scheduling in Wireless Networks with Network Coding

Joint Congestion Control and Scheduling in Wireless Networks with Network Coding Title Joint Congestion Control and Scheduling in Wireless Networks with Network Coding Authors Hou, R; Wong Lui, KS; Li, J Citation IEEE Transactions on Vehicular Technology, 2014, v. 63 n. 7, p. 3304-3317

More information

Caching Algorithm for Content-Oriented Networks Using Prediction of Popularity of Content

Caching Algorithm for Content-Oriented Networks Using Prediction of Popularity of Content Caching Algorithm for Content-Oriented Networks Using Prediction of Popularity of Content Hiroki Nakayama, Shingo Ata, Ikuo Oka BOSCO Technologies Inc. Osaka City University Background Cache has an important

More information

MAPI Computer Vision. Multiple View Geometry

MAPI Computer Vision. Multiple View Geometry MAPI Computer Vision Multiple View Geometry Geometry o Multiple Views 2- and 3- view geometry p p Kpˆ [ K R t]p Geometry o Multiple Views 2- and 3- view geometry Epipolar Geometry The epipolar geometry

More information

Research Article A Two-Level Cache for Distributed Information Retrieval in Search Engines

Research Article A Two-Level Cache for Distributed Information Retrieval in Search Engines The Scientific World Journal Volume 2013, Article ID 596724, 6 pages http://dx.doi.org/10.1155/2013/596724 Research Article A Two-Level Cache for Distributed Information Retrieval in Search Engines Weizhe

More information

Characterizing the network behavior of P2P traffic

Characterizing the network behavior of P2P traffic Characterizing the network behavior o PP traic Raaele Bolla, Marco Canini, Riccardo Rapuzzi, Michele Sciuto DIST - Department o Communication, Computer and System Sciences, University o Genoa Via Opera

More information

Enabling Correct Interest Forwarding and Retransmissions in a Content Centric Network

Enabling Correct Interest Forwarding and Retransmissions in a Content Centric Network Enabling Correct Interest Forwarding and Retransmissions in a Content Centric Network J. J. Garcia-Luna-Aceves 1,2 and Maziar Mirzazad-Barijough 1 1 Computer Engineering Department, University of California,

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

Scheduling Unsplittable Flows Using Parallel Switches

Scheduling Unsplittable Flows Using Parallel Switches Scheduling Unsplittable Flows Using Parallel Switches Saad Mneimneh, Kai-Yeung Siu Massachusetts Institute of Technology 77 Massachusetts Avenue Room -07, Cambridge, MA 039 Abstract We address the problem

More information

A Light-Weight Forwarding Plane for Content-Centric Networks

A Light-Weight Forwarding Plane for Content-Centric Networks A Light-Weight Forwarding Plane for Content-Centric Networks J.J. Garcia-Luna-Aceves 1,2 and Maziar Mirzazad-Barijough 2 1 Palo Alto Research Center, Palo Alto, CA 94304 2 Department of Computer Engineering,

More information

An Approach for Performance Evaluation of Batch-sequential and Parallel Architectural Styles

An Approach for Performance Evaluation of Batch-sequential and Parallel Architectural Styles An Approach or Perormance Evaluation o Batch-sequential and Parallel Architectural Styles Golnaz Aghaee Ghazvini MSc student, Young Research Club, Njaabad Branch, Esahan, Iran Aghaee.golnaz@sco.iaun.ac.ir

More information

SUPER RESOLUTION IMAGE BY EDGE-CONSTRAINED CURVE FITTING IN THE THRESHOLD DECOMPOSITION DOMAIN

SUPER RESOLUTION IMAGE BY EDGE-CONSTRAINED CURVE FITTING IN THE THRESHOLD DECOMPOSITION DOMAIN SUPER RESOLUTION IMAGE BY EDGE-CONSTRAINED CURVE FITTING IN THE THRESHOLD DECOMPOSITION DOMAIN Tsz Chun Ho and Bing Zeng Department o Electronic and Computer Engineering The Hong Kong University o Science

More information

A STUDY ON COEXISTENCE OF WLAN AND WPAN USING A PAN COORDINATOR WITH AN ARRAY ANTENNA

A STUDY ON COEXISTENCE OF WLAN AND WPAN USING A PAN COORDINATOR WITH AN ARRAY ANTENNA A STUDY ON COEXISTENCE OF WLAN AND WPAN USING A PAN COORDINATOR WITH AN ARRAY ANTENNA Yuta NAKAO(Graduate School o Engineering, Division o Physics, Electrical and Computer Engineering, Yokohama National

More information

Networking Named Content: Content-Centric Networking. John Rula

Networking Named Content: Content-Centric Networking. John Rula Networking Named Content: Content-Centric Networking John Rula Overview Replacing traditional host based routing with named content routing Consumers request a data s name instead of a host (ip address)

More information

Traffic-Aware Placement of NFV Middleboxes

Traffic-Aware Placement of NFV Middleboxes Traic-Aware Placement o NFV Middleboxes Wenrui Ma, Carlos Medina, and Deng Pan School o Computing and Inormation Sciences Florida International University, Miami, FL wma6@iu.edu, cmedi45@iu.edu, pand@iu.edu

More information

Sensors & Transducers 2016 by IFSA Publishing, S. L.

Sensors & Transducers 2016 by IFSA Publishing, S. L. Sensors & ransducers 06 by IFSA Publishing, S. L. http://www.sensorsportal.com Polynomial Regression echniques or Environmental Data Recovery in Wireless Sensor Networks Kohei Ohba, Yoshihiro Yoneda, Koji

More information

THE FINANCIAL CALCULATOR

THE FINANCIAL CALCULATOR Starter Kit CHAPTER 3 Stalla Seminars THE FINANCIAL CALCULATOR In accordance with the AIMR calculator policy in eect at the time o this writing, CFA candidates are permitted to use one o two approved calculators

More information

AN 608: HST Jitter and BER Estimator Tool for Stratix IV GX and GT Devices

AN 608: HST Jitter and BER Estimator Tool for Stratix IV GX and GT Devices AN 608: HST Jitter and BER Estimator Tool or Stratix IV GX and GT Devices July 2010 AN-608-1.0 The high-speed communication link design toolkit (HST) jitter and bit error rate (BER) estimator tool is a

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

Postprint.

Postprint. http://www.diva-portal.org Postprint This is the accepted version of a paper presented at The 13th Swedish National Computer Networking Workshop (SNCNW 2017), Halmstad University, May 29-30. Citation for

More information

Neighbourhood Operations

Neighbourhood Operations Neighbourhood Operations Neighbourhood operations simply operate on a larger neighbourhood o piels than point operations Origin Neighbourhoods are mostly a rectangle around a central piel Any size rectangle

More information

Applying TCP Congestion Control Schemes on NDN and their Implications for NDN Congestion Control. Shuo Yang

Applying TCP Congestion Control Schemes on NDN and their Implications for NDN Congestion Control. Shuo Yang Applying TCP Congestion Control Schemes on NDN and their Implications for NDN Congestion Control Shuo Yang Abstract While congestion control in TCP has been well studied, the future Internet architecture

More information

Rough Connected Topologized. Approximation Spaces

Rough Connected Topologized. Approximation Spaces International Journal o Mathematical Analysis Vol. 8 04 no. 53 69-68 HIARI Ltd www.m-hikari.com http://dx.doi.org/0.988/ijma.04.4038 Rough Connected Topologized Approximation Spaces M. J. Iqelan Department

More information

A dive into the caching performance of Content Centric Networking

A dive into the caching performance of Content Centric Networking A dive into the caching performance of Content Centric Networking Giuseppe Rossini, Dario Rossi Telecom ParisTech, Paris, France first.last@enst.fr Abstract Content Centric Networking (CCN) is a promising

More information

Performance Enhancement Of TCP For Wireless Network

Performance Enhancement Of TCP For Wireless Network P a g e 32 Vol. 10 Issue 12 (Ver. 1.0) October 2010 Global Journal of Computer Science and Technology Performance Enhancement Of TCP For Wireless Network 1 Pranab Kumar Dhar, 2 Mohammad Ibrahim Khan, 3

More information

Lower Bound for Mean Object Transfer Latency in the Narrowband IoT Environment

Lower Bound for Mean Object Transfer Latency in the Narrowband IoT Environment International Journal of Applied Engineering Research ISS 0973-456 Volume 1, umber 1 (017) pp. 3365-3369 Lower Bound for Mean Obect Transfer Latency in the arrowband IoT Environment Y. J. Lee Department

More information

HIGH SPEED LASER STRUCTURING OF CRYSTALLINE SILICON SOLAR CELLS

HIGH SPEED LASER STRUCTURING OF CRYSTALLINE SILICON SOLAR CELLS HIGH SPEED LASER STRUCTURING OF CRYSTALLINE SILICON SOLAR CELLS S. Eidelloth, T. Neubert, T. Brendemühl, S. Hermann, P. Giesel, and R. Brendel Institut ür Solarenergieorschung Hameln (ISFH), Am Ohrberg

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

AN IMPROVED STEP IN MULTICAST CONGESTION CONTROL OF COMPUTER NETWORKS

AN IMPROVED STEP IN MULTICAST CONGESTION CONTROL OF COMPUTER NETWORKS AN IMPROVED STEP IN MULTICAST CONGESTION CONTROL OF COMPUTER NETWORKS Shaikh Shariful Habib Assistant Professor, Computer Science & Engineering department International Islamic University Chittagong Bangladesh

More information

Defects Detection of Billet Surface Using Optimized Gabor Filters

Defects Detection of Billet Surface Using Optimized Gabor Filters Proceedings o the 7th World Congress The International Federation o Automatic Control Deects Detection o Billet Surace Using Optimized Gabor Filters Jong Pil Yun* SungHoo Choi* Boyeul Seo* Chang Hyun Park*

More information

AGENT-BASED ROUTING ALGORITHMS ON A LAN

AGENT-BASED ROUTING ALGORITHMS ON A LAN AGENT-BASED ROUTING ALGORITHMS ON A LAN Y. Yang, A. N. Zincir-Heywood, M. I. Heywood, S. Srinivas Faculty of Computer Science, Dalhousie University {yang@cs.dal.ca, zincir@cs.dal.ca, mheywood@cs.dal.ca,

More information

Week 2 / Paper 1. The Design Philosophy of the DARPA Internet Protocols

Week 2 / Paper 1. The Design Philosophy of the DARPA Internet Protocols Week 2 / Paper 1 The Design Philosophy of the DARPA Internet Protocols David D. Clark ACM CCR, Vol. 18, No. 4, August 1988 Main point Many papers describe how the Internet Protocols work But why do they

More information

A Method of Sign Language Gesture Recognition Based on Contour Feature

A Method of Sign Language Gesture Recognition Based on Contour Feature Proceedings o the World Congress on Engineering and Computer Science 014 Vol I WCECS 014, -4 October, 014, San Francisco, USA A Method o Sign Language Gesture Recognition Based on Contour Feature Jingzhong

More information

ROBUST FACE DETECTION UNDER CHALLENGES OF ROTATION, POSE AND OCCLUSION

ROBUST FACE DETECTION UNDER CHALLENGES OF ROTATION, POSE AND OCCLUSION ROBUST FACE DETECTION UNDER CHALLENGES OF ROTATION, POSE AND OCCLUSION Phuong-Trinh Pham-Ngoc, Quang-Linh Huynh Department o Biomedical Engineering, Faculty o Applied Science, Hochiminh University o Technology,

More information

IN this letter we focus on OpenFlow-based network state

IN this letter we focus on OpenFlow-based network state 1 On the Impact of Networ State Collection on the Performance of SDN Applications Mohamed Aslan, and Ashraf Matrawy Carleton University, ON, Canada Abstract Intelligent and autonomous SDN applications

More information

Fusion of Heterogeneous Sensors for the Guidance of an Autonomous Vehicle

Fusion of Heterogeneous Sensors for the Guidance of an Autonomous Vehicle Fusion o Heterogeneous Sensors or the Guidance o an Autonomous Vehicle Jan C. Becer Institute o Control Engineering echnical University Braunschweig Hans-Sommer-Str. 66 3816 Braunschweig, Germany jan.becer@tu-bs.de

More information

STUDIES ON THE PERFORMANCE IMPROVEMENT OF WINDOW ADJUSTMENT PROCEDURE IN HIGH BANDWIDTH DELAY PRODUCT NETWORK

STUDIES ON THE PERFORMANCE IMPROVEMENT OF WINDOW ADJUSTMENT PROCEDURE IN HIGH BANDWIDTH DELAY PRODUCT NETWORK STUDIES ON THE PERFORMANCE IMPROVEMENT OF WINDOW ADJUSTMENT PROCEDURE IN HIGH BANDWIDTH DELAY PRODUCT NETWORK Ms.T.Sheela* and Dr.J.Raja** *Research Scholar, Satyabama University, Chennai, sheela_saiit@yahoo.com

More information

Reliable Transport I: Concepts and TCP Protocol

Reliable Transport I: Concepts and TCP Protocol Reliable Transport I: Concepts and TCP Protocol Brad Karp UCL Computer Science CS 3035/GZ01 29 th October 2013 Part I: Transport Concepts Layering context Transport goals Transport mechanisms 2 Context:

More information

Optimum design of roll forming process of slide rail using design of experiments

Optimum design of roll forming process of slide rail using design of experiments Journal o Mechanical Science and Technology 22 (28) 1537~1543 Journal o Mechanical Science and Technology www.springerlink.com/content/1738-494x DOI 1.17/s1226-8-43-9 Optimum design o roll orming process

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

TCP and UDP Fairness in Vehicular Ad hoc Networks

TCP and UDP Fairness in Vehicular Ad hoc Networks TCP and UDP Fairness in Vehicular Ad hoc Networks Forouzan Pirmohammadi 1, Mahmood Fathy 2, Hossein Ghaffarian 3 1 Islamic Azad University, Science and Research Branch, Tehran, Iran 2,3 School of Computer

More information

9.8 Graphing Rational Functions

9.8 Graphing Rational Functions 9. Graphing Rational Functions Lets begin with a deinition. Deinition: Rational Function A rational unction is a unction o the orm P where P and Q are polynomials. Q An eample o a simple rational unction

More information

foldr CS 5010 Program Design Paradigms Lesson 5.4

foldr CS 5010 Program Design Paradigms Lesson 5.4 oldr CS 5010 Program Design Paradigms Lesson 5.4 Mitchell Wand, 2012-2014 This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. 1 Introduction In this lesson,

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5

New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 New Key-Recovery Attacks on MAC/NMAC-MD4 and NMAC-MD5 Lei Wang, Kazuo Ohta and Noboru Kunihiro* The University o Electro-Communications * The University o Tokyo at present. 1 Motivation o This Research

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Improving TCP Performance over Wireless Networks using Loss Predictors

Improving TCP Performance over Wireless Networks using Loss Predictors Improving TCP Performance over Wireless Networks using Loss Predictors Fabio Martignon Dipartimento Elettronica e Informazione Politecnico di Milano P.zza L. Da Vinci 32, 20133 Milano Email: martignon@elet.polimi.it

More information

Measuring the Vulnerability of Interconnection. Networks in Embedded Systems. University of Massachusetts, Amherst, MA 01003

Measuring the Vulnerability of Interconnection. Networks in Embedded Systems. University of Massachusetts, Amherst, MA 01003 Measuring the Vulnerability o Interconnection Networks in Embedded Systems V. Lakamraju, Z. Koren, I. Koren, and C. M. Krishna Department o Electrical and Computer Engineering University o Massachusetts,

More information

A Learning-based Adaptive Routing Tree for Wireless Sensor Networks

A Learning-based Adaptive Routing Tree for Wireless Sensor Networks A Learning-based Adaptive Routing Tree or Wireless Sensor Networks Ying Zhang and Qingeng Huang Palo Alto Research Center (PARC) Inc. 3333 Coyote Hill Road Palo Alto, CA 9434, USA Emails:{yzhang, qhuang}@parc.com

More information

SERVICE DISTRIBUTION MECHANISMS IN INFORMATION-CENTRIC NETWORKING

SERVICE DISTRIBUTION MECHANISMS IN INFORMATION-CENTRIC NETWORKING SERVICE DISTRIBUTION MECHANISMS IN INFORMATION-CENTRIC NETWORKING Bachelorarbeit der Philosophisch-naturwissenschaftlichen Fakultät der Universität Bern vorgelegt von Oliver Stapleton 2015 Leiter der Arbeit:

More information

Lagrangian relaxations for multiple network alignment

Lagrangian relaxations for multiple network alignment Noname manuscript No. (will be inserted by the editor) Lagrangian relaxations or multiple network alignment Eric Malmi Sanjay Chawla Aristides Gionis Received: date / Accepted: date Abstract We propose

More information