Boundary Recognition in Sensor Networks. Ng Ying Tat and Ooi Wei Tsang

Size: px
Start display at page:

Download "Boundary Recognition in Sensor Networks. Ng Ying Tat and Ooi Wei Tsang"

Transcription

1 Boundary Recognition in Sensor Networks Ng Ying Tat and Ooi Wei Tsang School of Computing, National University of Singapore ABSTRACT Boundary recognition for wireless sensor networks has many applications, such as routing and ensuring that network coverage is sufficient. For a large number of sensor nodes that would have been deployed, equipped with only connectivity information, they are able to discern which nodes are at the boundary. There have been a number of algorithms proposed to solve this problem but due to the limitation of sensor nodes, in terms of computational power and lifespan, some of these algorithms might not be adequate. In this project, an algorithm that promises good performance with a minimal set of assumptions is explored and modifications were incorporated. Since it is a distributed algorithm, points in the algorithm where the nodes need to be synchronized were identified. With the implementation of the algorithm, the nodes that are close to the boundaries would be able to be identified. 1 INTRODUCTION Boundary recognition is closely linked with the issue of network coverage. Sensor networks are deployed to surveil an area of interest and it is important that it has adequate coverage. A boundary that is detected within an area of interest, a hole, would mean that there is inadequate coverage and deployment of additional sensor nodes would be necessary. Boundary recognition also helps in routing in wireless sensor networks. Funke tells us of a few protocols which uses network topology to facilitate routing (2005). Li & Liu proposes the Rendered Path (REP) protocol which uses boundary recognition as a stepping stone to estimate node-to-node distances and calculate node locations (2007). We can classify methods for boundary recognition into two categories, statistical and geometrical/topological. Statistical methods are based on the observation that certain phenomenon occurs more frequently to nodes at the boundary than other nodes. Geometrical/ topological methods use the geometrical/topological properties of the network connectivity graphs in finding holes and boundaries in the network. When we are searching for an answer to the boundary recognition problem; we should try to minimize the set of assumptions such that they are as general and as realistic as possible. Since the algorithm proposed by Wang et al. promises good performance for a reasonable set of assumptions, we will study it in great detail in this paper. We attempt to replicate the algorithm and where appropriate, we added in modifications of our own. In this paper, we present algorithms that are modifications to the original algorithm and are necessary to address certain issues that are not mentioned previously. 2 TOPOLOGICAL BOUNDARY RECOGNITION The algorithm proposed by Wang et al. promises good performance for a realistic set of assumptions. The algorithm is distributed and only depends on connectivity information. It is able to create reasonably accurate boundaries with an average node degree of 10. 1

2 There are a total of 6 steps in the algorithm proposed by Wang et al. 1. Create a shortest path tree that is rooted at an arbitrary node. 2. When the shortest path tree is being formed, we find nodes that form the cut where the shortest paths meet after passing around holes. These nodes are found by checking the two criteria that would determine the size of the hole that is to be identified. 3. We take the cut which is furthest from the root and use it form the inner boundary. The inner boundary would encompass all holes in the network and can be found through flooding. 4. After this we will flood the network from the inner boundary. Each node in the network would record its minimum hop count to the boundary and also obtain a label. We will then be able to detect extremal nodes as they are the nodes with the local maximum hop count to the cycle. These extremal nodes would then connect themselves and form extremal connected components (ECC). 5. With the extremal nodes found, we can connect them into a cycle and thus find the outer boundary. Now, if we have started with multiple holes, we can proceed to find other boundaries through the other cuts that exists in the network. 3 OUR CONTRIBUTIONS For our implementation of the algorithm, we adopt the same assumptions that only connectivity information is available to a sensor node and that the actual physical coordinates of the sensor node are not available. In addition, we assume that we have a reliable channel where messages are guaranteed to be delivered within a specified time interval and also an ideal routing protocol that would deliver messages via the shortest path. In order to focus on selected key areas and ensure that we cover them with sufficient depth, we would only be considering the case of a single convex hole in the network. We will focus on three areas in the algorithm by Wang et al., which are the discovery of cut nodes and cut branches, the discovery of extremal nodes and finally, the discovery of the outer boundary. A brief list of the significant areas that we will visit in the paper and improvements that we have implemented is as follows: 1. An improved algorithm for checking criterion 2 2. Creating cut connected components and synchronization prior to creating them 3. Establishing extremal distances and extremal labels 4. Finding extremal nodes and extremal connected components 5. Linking up extremal connected components to form chains 6. Choosing the chains to form the boundary by rejecting false extremal nodes 7. Synchronization required in the algorithm 3.1 Finding the Cut The shortest path tree upon meeting the hole would branch out, and subsequently branches on both side of the hole would meet and form a cut. The nodes on either side of the cut would exchange messages to build the shortest path tree. When they realize that the messages originate from members of the same tree, by comparing their labels, they would check for the first criterion. The first criterion states that their nearest common ancestor (NCA) in the shortest path tree has to be distance away. The distance between two nodes is taken as the hop count between them. This can be done easily by checking the label of the receiver and the label of the 2

3 sender (which would be attached in the message). The second criterion is checked by local flooding from each node in the cut pair up to a distance (Wang et al.,2006). The purpose of the second criterion is to check for branches that run parallel and are not a product of a hole between them and thus ensures that the holes that we detect are of a certain diameter. Since our metric for distance is hop count, and there are no nodes in the hole for us to perform the Original Improved hop count, we have to do local flooding 0 from a branch and attempt to find the other branch. However, as flooding is an expensive operation, we suggest that to check criterion 2, we use only a single node that is of distance up the shortest Ave Node Degree Figure 1 Number of messages sent to check criterion 2. path tree to perform the flooding rather than all nodes in the branch. When the cut nodes are found, we have to connect them into connected components. A problem that we have is that the status of all nodes in the network, as cut or non- cut nodes, are not confirmed at the same time. This is because, it is hard to predict the amount of time required to check the second criterion and a node might have to undergo several checks before it is finally confirmed as a cut node or rejected as a non- cut node. Therefore, at this stage, there is a form of network synchronization that is done at a small and local part of the network. The method that we employ to overcome this problem is based on the fact that when a node has received the shortest path tree message from all its neighbours, it would become stable and not initiate checking for its cut node status. Thus, once a cut node has confirmed its status, it would start to build a connected component rooted No. of messages (in thousands) Figure 2 Extremal nodes are coloured black and examples of ECCs are circled. The arrow indicates increasing extremal labels. at itself. Neighbours would only reply once they are stable. Only the tree rooted at the cut node with the lowest distance to the root would survive and that cut node would realize that the connected component is successfully completed when it receives all replies from its neighbours. We can then synchronize globally to decide which connected component has the greatest distance from the root and build the inner boundary from there. 3.2 Extremal Node Discovery After we have built the inner boundary, we proceed to find extremal nodes. A flooding of the network is done from the inner boundary and each node records the minimum hop count to nodes in the inner boundary (Wang et al., 2006). An extremal node is a node where its neighbours have an extremal distance greater than or equal to its own and it can detect itself by checking its direct neighbours (Wang et al., 2006). Each node would also calculate a label (extremal label) which is the average label of the labels of all its 1 hop neighbours. As 3

4 nodes along the inner boundary would be assigned a unique label which indicates its position (Wang et al., 2006) on the inner boundary, the extremal label of the nodes can provide hints on its position in the network. From Figure 2, we can see that the extremal label increases in the direction of the arrow. Using the similar method for connecting cut nodes, we connect extremal nodes that are in close proximity into extremal connected components (ECC) and these ECC are identified by two nodes which have the greatest distance between each other, or by itself if the ECC consists of only one node. In our implementation, we use the extremal labels to determine which two nodes to select. The node in the ECC with the lowest extremal label would be the head of the ECC and the node with the highest extremal label would be the tail of the ECC. Once all possible ECCs are formed, the network has to be synchronized globally before we can proceed to connect the ECCs together into a boundary. The tail of every ECC would attempt to search for the head of another ECC and would choose the nearest ECC with the highest extremal distance to connect to. We cannot choose any ECC as the ECC might be on the inner boundary or it could be false extremal node. 3.3 Finding the Outer Boundary Finally, we will consider the problem of finding the outer boundary with the use of the connected ECC. In the algorithm by Wang et al., the inner boundary and all its 1-hop neighbours are ignored for this step so that we can differentiate between the inner and outer boundaries (2006). The 2-hop neighbours are then connected to form a path. We experimented with our own modifications for this step. From experiments, we realize that extremal nodes occur at other places other than the boundaries. A node can be out of communication range of the nodes with 1 extremal distance and thus it think that it is an extremal node. We remove these false extremal nodes by selecting the longest connected ECCs that has a head with the highest extremal distance. After selecting appropriate interconnected ECCs, we use the path to control which ECC to choose. All these ECCs have a shortest path to the path for both ends and thus be able to project themselves onto the path. We will then tour the path and reject ECCs that are completely overlapped by other ECCs and those nodes on ECCs that are not rejected would be marked as boundary nodes. 4 IMPLEMENTATION AND EXPERIMENTS We implemented the algorithm with Java because of its object-oriented capabilities. There are two main objects used, the sensors and the messages that are passed between them. All messages are sent to a discrete event simulator (DES) where it is queued and sorted according to time. We start the simulation by adding the message that would trigger the building of the shortest path tree into the DES. The DES would pop the message and would allow a sensor node to act on that message where more messages would be added into DES. The simulation ends when the DES is empty. In our implementation, time is in discrete units and when a node sends a message to a neighbour at time N, the neighbour would receive it at time N+1. In our experiments, we put our algorithms to the test using 3 different datasets and the results are shown below (Figure 3 & 4). First, we have the sensor nodes placed on a grid spaced 0.5 units apart we shift each of them in a random direction by a random amount. The average node degree is 10. Secondly we have the same grid without the random shift and this results in a average node degree of 7. Lastly, we have the sensor nodes placed on a grid spaced 0.45 units apart and we shift each of the nodes by a random amount. It has average node degree of 13. 4

5 (i) (ii) (iii) (iv) (v) (vi) Figure 3 Results for various stages of the algorithm for a network with average node degree of 13 with random shift. (i) The shortest path tree rooted by the node at the top left corner of the network. Cut nodes are coloured cyan. (ii) The inner boundary and extremal distances. The inner boundary is demarcated by the green line and the different colours of the nodes indicate different extremal distances. (iii) The inner boundary and extremal nodes. Extremal nodes are coloured black. (iv) ECC and ECC chains. The head and tail of an ECC is connected with blue lines whereas inter-ecc connection is marked by red lines. (v) The shortest path tree rooted from the inner boundary. (vi) Outer boundary found. Nodes on the outer boundary are marked black. 5

6 5 CONCLUSION In our experiments, we are able to find boundaries that are reasonably close to actual physical boundaries. The algorithm proposed by Wang et al. promises the best performance with a realistic set of assumptions and we try to replicate the algorithm albeit with some modifications of our own. These modifications were added to deal with certain areas that are not addressed by their algorithm. For example, the question of network synchronization and extremal nodes occurring in areas other than the boundary are not discussed in the algorithm. Our paper attempts to solve these problems adequately and efficiently. References [1] Fekete, S. P., Kaufmann, M., Kröller, A., & Lehmann, K. (2005). A New Approach for Boundary Recognition in Geometric Sensor Networks. Proceedings of 17th Canadian Conference on Computational Geometry, (pp ). [2] Fekete, S., Kröller, A., Pfisterer, D., Fischer, S., & Buschmann, C. (2004). Neighbourhood-Based Topology Recognition in Sensor Networks. Proceedings of ALGOSENSORS (pp ). Springer LNCS. Figure 4 Results for average node degree of 10 with random shift (top) and for average node degree of 7 without random shift (bottom) [3] Funke, S. (2005). Topological Hole Detection in Wireless Sensor Networks and its Applications. Proceedings of Joint Workshop on Foundations of Mobile Computing (pp ). Cologne: ACM. [4] Funke, S., & Klein, C. (2006). Hole Dectection or: "How Much Geometry Hides in Connectivity?". Proceedings of 22nd ACM Symposium Computational Geometry (pp ). Sedona: ACM. [5] Kröller, A., Fekete, S. P., Pfisterer, D., & Fischer, S. (2006). Deterministic boundary recognition and topology extraction for large sensor networks. Proceedings of 17th ACM-SIAM Symposium Discrete Algorithms (pp ). Miami: SIAM. [6] Li, M., & Liu, Y. (2007). Rendered Path: Range-Free Localization in Anisotropic Sensor Networks with Holes. Proccedings of ACM MobiCom (pp ). Montreal: ACM. [7] Wang, Y., Gao, J., & Mitchell, J. S. (2006). Boundary Recognition in Sensor Networks by Topological Methods. Proceedings of ACM MobiCom (pp ). Los Angeles: ACM. 6

On Boundary Recognition without Location Information in Wireless Sensor Networks

On Boundary Recognition without Location Information in Wireless Sensor Networks Rheinische Friedrich-Wilhelms-Universität Bonn Institute for Computer cience IV Römerstraße 164 D-53117 Bonn On Boundary Recognition without Location Information in Wireless ensor Networks Olga aukh 1,

More information

Hole Detection and Boundary Recognition in Wireless Sensor Networks

Hole Detection and Boundary Recognition in Wireless Sensor Networks Hole Detection and Boundary Recognition in Wireless Sensor Networks Kun-Ying Hsieh Dept. of Computer Science and Information Engineering National Central University Jhongli, 32054, Taiwan E-mail: rocky@axp1.csie.ncu.edu.tw

More information

Decentralized Boundary Detection without Location Information in Wireless Sensor Networks

Decentralized Boundary Detection without Location Information in Wireless Sensor Networks 2012 IEEE Wireless Communications and Networking Conference: Mobile and Wireless Networks Decentralized Boundary Detection without Location Information in Wireless Sensor Networks Wei-Cheng Chu Institute

More information

Boundary Recognition in Sensor Networks by Topological Methods

Boundary Recognition in Sensor Networks by Topological Methods Boundary Recognition in Sensor Networks by Topological Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B. Mitchell Dept. of Applied Math. and Statistics

More information

Literature Review on Hole Detection and Healing in Wireless Sensor Network

Literature Review on Hole Detection and Healing in Wireless Sensor Network Review Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Samidha

More information

Light-weight Contour Tracking in Wireless Sensor Networks

Light-weight Contour Tracking in Wireless Sensor Networks Light-weight Contour Tracking in Wireless Sensor Networks Xianjin Zhu Rik Sarkar Jie Gao Joseph S. B. Mitchell INFOCOM 08 1 Motivation Sensor network: sense and monitor the physical world (temperature,

More information

GIS based topology for wireless sensor network modeling: Arc-Node topology approach

GIS based topology for wireless sensor network modeling: Arc-Node topology approach GIS based topology for wireless sensor network modeling: Arc-Node topology approach S.Amin Hosseini (Author) Zanjan Branch, Islamic Azad University, Zanjan,. Iran Email: s.a.hosseini86@gmail.com Behrooz

More information

Generating Tool Paths for Free-Form Pocket Machining Using z-buffer-based Voronoi Diagrams

Generating Tool Paths for Free-Form Pocket Machining Using z-buffer-based Voronoi Diagrams Int J Adv Manuf Technol (1999) 15:182 187 1999 Springer-Verlag London Limited Generating Tool Paths for Free-Form Pocket Machining Using z-buffer-based Voronoi Diagrams Jaehun Jeong and Kwangsoo Kim Department

More information

SDC: A Distributed Clustering Protocol for Peer-to-Peer Networks

SDC: A Distributed Clustering Protocol for Peer-to-Peer Networks SDC: A Distributed Clustering Protocol for Peer-to-Peer Networks Yan Li 1, Li Lao 2, and Jun-Hong Cui 1 1 Computer Science & Engineering Dept., University of Connecticut, CT 06029 2 Computer Science Dept.,

More information

Simple Nested Dielectrics in Ray Traced Images

Simple Nested Dielectrics in Ray Traced Images Simple Nested Dielectrics in Ray Traced Images Charles M. Schmidt and Brian Budge University of Utah Abstract This paper presents a simple method for modeling and rendering refractive objects that are

More information

GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks. Stanford University. HP Labs

GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks. Stanford University. HP Labs GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks Qing Fang Jie Gao Leonidas J. Guibas Vin de Silva Li Zhang Stanford University HP Labs Point-to-Point Routing in Sensornets Routing

More information

Cut Graph Based Information Storage and Retrieval in 3D Sensor Networks with General Topology

Cut Graph Based Information Storage and Retrieval in 3D Sensor Networks with General Topology 213 Proceedings IEEE INFOCOM Cut Graph Based Information Storage and Retrieval in 3D Sensor Networks with General Topology Yang Yang, Miao Jin, Yao Zhao, and Hongyi Wu Abstract We address the problem of

More information

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department

More information

An Alpha-Shapes based Technique for Detecting Boundaries of a Wireless Sensor Network

An Alpha-Shapes based Technique for Detecting Boundaries of a Wireless Sensor Network An Alpha-Shapes based Technique for Detecting Boundaries of a Wireless Sensor Network Rajesh Sharma Lalit Kumar Awasthi Naveen Chauhan ABSTRACT Nodes along the boundaries of a Wireless Sensor Network (WSN)

More information

BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications

BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications Kai-Juan Wong, Bu-Sung Lee, Boon-Chong Seet, Genping Liu, Lijuan Zhu School of Computer

More information

FREE REGIONS OF SENSOR NODES. Howard R. Hughes College of Engineering. University of Nevada, Las Vegas, NV ABSTRACT

FREE REGIONS OF SENSOR NODES. Howard R. Hughes College of Engineering. University of Nevada, Las Vegas, NV ABSTRACT FREE REGIONS OF SENSOR NODES Laxmi Gewali 1, Navin Rongatana 2, Henry Selvaraj 3, Jan B. Pedersen 4 Howard R. Hughes College of Engineering University of Nevada, Las Vegas, NV 89154-4026 1 laxmi@cs.unlv.edu,

More information

Reliable Time Synchronization Protocol for Wireless Sensor Networks

Reliable Time Synchronization Protocol for Wireless Sensor Networks Reliable Time Synchronization Protocol for Wireless Sensor Networks Soyoung Hwang and Yunju Baek Department of Computer Science and Engineering Pusan National University, Busan 69-735, South Korea {youngox,yunju}@pnu.edu

More information

An efficient implementation of the greedy forwarding strategy

An efficient implementation of the greedy forwarding strategy An efficient implementation of the greedy forwarding strategy Hannes Stratil Embedded Computing Systems Group E182/2 Technische Universität Wien Treitlstraße 3 A-1040 Vienna Email: hannes@ecs.tuwien.ac.at

More information

A Search Set Model of Path Tracing in Graphs: Supplementary Materials

A Search Set Model of Path Tracing in Graphs: Supplementary Materials A Search Set Model of Path Tracing in Graphs: Supplementary Materials Jessica Q. Dawson, Tamara Munzner and Joanna McGrenere This supplementary material contains two sections. In the first section, we

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

Posted on arxiv April

Posted on arxiv April On the predictability of the number of convex vertices Jean Souviron 1 COGITECH Jean Souviron 613 D Ailleboust Montréal, Quebec, H2R 1K2 Canada JeanSouviron@hotmail.com Abstract : Convex hulls are a fundamental

More information

[Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations

[Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations Landmark-based routing Landmark-based routing [Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations of Computer

More information

RINGS : A Technique for Visualizing Large Hierarchies

RINGS : A Technique for Visualizing Large Hierarchies RINGS : A Technique for Visualizing Large Hierarchies Soon Tee Teoh and Kwan-Liu Ma Computer Science Department, University of California, Davis {teoh, ma}@cs.ucdavis.edu Abstract. We present RINGS, a

More information

Ordering and Ranking Multivariate Data

Ordering and Ranking Multivariate Data Ordering and Ranking Multivariate Data The concept of order or rank within a multivariate dataset can be quite complicated. How would you rank these data: 1 Obs. Number x 1 x 2 1 10 66 2 19 52 3 8 88 4

More information

State-Based Synchronization Protocol in Sensor Networks

State-Based Synchronization Protocol in Sensor Networks State-Based Synchronization Protocol in Sensor Networks Shang-Chih Hsu Wei Yen 1 1 Department of Computer Science and Engineering, Tatung University, Taipei, Taiwan, ROC shanzihsu@yahoo.com.tw, wyen@ttu.edu.tw

More information

Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud

Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud 2016 International Conference on Service Science, Technology and Engineering (SSTE 2016) ISBN: 978-1-60595-351-9 Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous

More information

Interconnection networks

Interconnection networks Interconnection networks When more than one processor needs to access a memory structure, interconnection networks are needed to route data from processors to memories (concurrent access to a shared memory

More information

ZigBee Routing Algorithm Based on Energy Optimization

ZigBee Routing Algorithm Based on Energy Optimization Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com ZigBee Routing Algorithm Based on Energy Optimization Wangang Wang, Yong Peng, Yongyu Peng Chongqing City Management College, No. 151 Daxuecheng

More information

Estimating the Free Region of a Sensor Node

Estimating the Free Region of a Sensor Node Estimating the Free Region of a Sensor Node Laxmi Gewali, Navin Rongratana, Jan B. Pedersen School of Computer Science, University of Nevada 4505 Maryland Parkway Las Vegas, NV, 89154, USA Abstract We

More information

Single Pass Connected Components Analysis

Single Pass Connected Components Analysis D. G. Bailey, C. T. Johnston, Single Pass Connected Components Analysis, Proceedings of Image and Vision Computing New Zealand 007, pp. 8 87, Hamilton, New Zealand, December 007. Single Pass Connected

More information

Simulations of the quadrilateral-based localization

Simulations of the quadrilateral-based localization Simulations of the quadrilateral-based localization Cluster success rate v.s. node degree. Each plot represents a simulation run. 9/15/05 Jie Gao CSE590-fall05 1 Random deployment Poisson distribution

More information

Constrained Clustering with Interactive Similarity Learning

Constrained Clustering with Interactive Similarity Learning SCIS & ISIS 2010, Dec. 8-12, 2010, Okayama Convention Center, Okayama, Japan Constrained Clustering with Interactive Similarity Learning Masayuki Okabe Toyohashi University of Technology Tenpaku 1-1, Toyohashi,

More information

A host selection model for a distributed bandwidth broker

A host selection model for a distributed bandwidth broker A host selection model for a distributed bandwidth broker Christos Bouras Dimitris Primpas Research Academic Computer Technology Institute, Ν.Κazantzaki Str., Patras University 26500 Rion, Patras, Greece

More information

Increasing interconnection network connectivity for reducing operator complexity in asynchronous vision systems

Increasing interconnection network connectivity for reducing operator complexity in asynchronous vision systems Increasing interconnection network connectivity for reducing operator complexity in asynchronous vision systems Valentin Gies and Thierry M. Bernard ENSTA, 32 Bd Victor 75015, Paris, FRANCE, contact@vgies.com,

More information

Sensor Deployment Algorithm for Hole Detection and Healing By Using Local Healing

Sensor Deployment Algorithm for Hole Detection and Healing By Using Local Healing Sensor Deployment Algorithm for Hole Detection and Healing By Using Local Healing Rini Baby N M.G University, Kottayam, Kerala, India Abstract: The main services provided by a WSN (wireless sensor network)

More information

Data Mining. 3.3 Rule-Based Classification. Fall Instructor: Dr. Masoud Yaghini. Rule-Based Classification

Data Mining. 3.3 Rule-Based Classification. Fall Instructor: Dr. Masoud Yaghini. Rule-Based Classification Data Mining 3.3 Fall 2008 Instructor: Dr. Masoud Yaghini Outline Using IF-THEN Rules for Classification Rules With Exceptions Rule Extraction from a Decision Tree 1R Algorithm Sequential Covering Algorithms

More information

Building Reliable 2D Maps from 3D Features

Building Reliable 2D Maps from 3D Features Building Reliable 2D Maps from 3D Features Dipl. Technoinform. Jens Wettach, Prof. Dr. rer. nat. Karsten Berns TU Kaiserslautern; Robotics Research Lab 1, Geb. 48; Gottlieb-Daimler- Str.1; 67663 Kaiserslautern;

More information

Computer Graphics. Attributes of Graphics Primitives. Somsak Walairacht, Computer Engineering, KMITL 1

Computer Graphics. Attributes of Graphics Primitives. Somsak Walairacht, Computer Engineering, KMITL 1 Computer Graphics Chapter 4 Attributes of Graphics Primitives Somsak Walairacht, Computer Engineering, KMITL 1 Outline OpenGL State Variables Point Attributes t Line Attributes Fill-Area Attributes Scan-Line

More information

Mobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo

Mobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo Mobile and Sensor Systems Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo In this lecture In this lecture we will describe the difference in infrastructure and ad

More information

Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method

Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.5, May 2017 265 Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method Mohammad Pashaei, Hossein Ghiasy

More information

PROCESS SCHEDULING II. CS124 Operating Systems Fall , Lecture 13

PROCESS SCHEDULING II. CS124 Operating Systems Fall , Lecture 13 PROCESS SCHEDULING II CS124 Operating Systems Fall 2017-2018, Lecture 13 2 Real-Time Systems Increasingly common to have systems with real-time scheduling requirements Real-time systems are driven by specific

More information

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy, Anna University Chennai,

More information

Geometric Considerations for Distribution of Sensors in Ad-hoc Sensor Networks

Geometric Considerations for Distribution of Sensors in Ad-hoc Sensor Networks Geometric Considerations for Distribution of Sensors in Ad-hoc Sensor Networks Ted Brown, Deniz Sarioz, Amotz Bar-Noy, Tom LaPorta, Dinesh Verma, Matthew Johnson, Hosam Rowaihy November 20, 2006 1 Introduction

More information

SHARED MEMORY VS DISTRIBUTED MEMORY

SHARED MEMORY VS DISTRIBUTED MEMORY OVERVIEW Important Processor Organizations 3 SHARED MEMORY VS DISTRIBUTED MEMORY Classical parallel algorithms were discussed using the shared memory paradigm. In shared memory parallel platform processors

More information

Geometric Unique Set Cover on Unit Disks and Unit Squares

Geometric Unique Set Cover on Unit Disks and Unit Squares CCCG 2016, Vancouver, British Columbia, August 3 5, 2016 Geometric Unique Set Cover on Unit Disks and Unit Squares Saeed Mehrabi Abstract We study the Unique Set Cover problem on unit disks and unit squares.

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Networks: A Deterministic Approach with Constant Overhead

Networks: A Deterministic Approach with Constant Overhead Trace-Routing in 3D Wireless Sensor Networks: A Deterministic Approach with Constant Overhead Su Xia, Hongyi Wu, and Miao Jin! School of Computing and Informatics! University of Louisiana at Lafayette

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

Staff Line Detection by Skewed Projection

Staff Line Detection by Skewed Projection Staff Line Detection by Skewed Projection Diego Nehab May 11, 2003 Abstract Most optical music recognition systems start image analysis by the detection of staff lines. This work explores simple techniques

More information

VI. ROUTING. - "routing protocol" nodes exchange information to ensure consistent understanding of paths

VI. ROUTING. - routing protocol nodes exchange information to ensure consistent understanding of paths (a) General Concepts VI. ROUTING - "routing" determination of suitable (i.e., least cost) path from a source to every destination (i.e., which nodes/switches/routers are in path) - "routing protocol" nodes

More information

Routing Outline. EECS 122, Lecture 15

Routing Outline. EECS 122, Lecture 15 Fall & Walrand Lecture 5 Outline EECS, Lecture 5 Kevin Fall kfall@cs.berkeley.edu Jean Walrand wlr@eecs.berkeley.edu Definition/Key Questions Distance Vector Link State Comparison Variations EECS - Fall

More information

Event Object Boundaries in RDF Streams A Position Paper

Event Object Boundaries in RDF Streams A Position Paper Event Object Boundaries in RDF Streams A Position Paper Robin Keskisärkkä and Eva Blomqvist Department of Computer and Information Science Linköping University, Sweden {robin.keskisarkka eva.blomqvist}@liu.se

More information

v Overview SMS Tutorials Prerequisites Requirements Time Objectives

v Overview SMS Tutorials Prerequisites Requirements Time Objectives v. 12.2 SMS 12.2 Tutorial Overview Objectives This tutorial describes the major components of the SMS interface and gives a brief introduction to the different SMS modules. Ideally, this tutorial should

More information

A Real-Time Directed Routing Protocol Based on Projection of Convex Holes on Underwater Acoustic Networks

A Real-Time Directed Routing Protocol Based on Projection of Convex Holes on Underwater Acoustic Networks I.J. Wireless and Microwave Technologies, 01,, 65-73 Published Online April 01 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijwmt.01.0.10 Available online at http://www.mecs-press.net/ijwmt A Real-Time

More information

1. Below is an example 1D river reach model built in HEC-RAS and displayed in the HEC-RAS user interface:

1. Below is an example 1D river reach model built in HEC-RAS and displayed in the HEC-RAS user interface: How Do I Import HEC-RAS Cross-Section Data? Flood Modeller allows you to read in cross sections defined in HEC-RAS models, automatically converting them to Flood Modeller 1D cross sections. The procedure

More information

A Distributed Boundary Detection Algorithm for Multi-Robot Systems

A Distributed Boundary Detection Algorithm for Multi-Robot Systems A Distributed Boundary Detection Algorithm for Multi-Robot Systems James McLurkin and Erik D. Demaine Abstract We describe a distributed boundary detection algorithm suitable for use on multi-robot systems

More information

Overlapping Ring Monitoring Algorithm in TIPC

Overlapping Ring Monitoring Algorithm in TIPC Overlapping Ring Monitoring Algorithm in TIPC Jon Maloy, Ericsson Canada Inc. Montreal April 7th 2017 PURPOSE When a cluster node becomes unresponsive due to crash, reboot or lost connectivity we want

More information

A Weighted Majority Voting based on Normalized Mutual Information for Cluster Analysis

A Weighted Majority Voting based on Normalized Mutual Information for Cluster Analysis A Weighted Majority Voting based on Normalized Mutual Information for Cluster Analysis Meshal Shutaywi and Nezamoddin N. Kachouie Department of Mathematical Sciences, Florida Institute of Technology Abstract

More information

Clustering Based Topology Control Protocol for Data Delivery in Wireless Sensor Networks

Clustering Based Topology Control Protocol for Data Delivery in Wireless Sensor Networks Clustering Based Topology Control Protocol for Data Delivery in Wireless Sensor Networks 1 Konda.Hari Krishna Ph.D -Research Scholar- Dept. of Computer Science & Engineering, Lingaya s Vidyapeeth University,

More information

A SOLUTION FOR REPLICA CONSISTENCY MAINTENANCE IN UNSTRUCTURED PEER-TO-PEER NETWORKS

A SOLUTION FOR REPLICA CONSISTENCY MAINTENANCE IN UNSTRUCTURED PEER-TO-PEER NETWORKS INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 A SOLUTION FOR REPLICA CONSISTENCY MAINTENANCE IN UNSTRUCTURED PEER-TO-PEER NETWORKS Narjes Nikzad Khasmakhi 1, Shahram

More information

Lecture 5: Simplicial Complex

Lecture 5: Simplicial Complex Lecture 5: Simplicial Complex 2-Manifolds, Simplex and Simplicial Complex Scribed by: Lei Wang First part of this lecture finishes 2-Manifolds. Rest part of this lecture talks about simplicial complex.

More information

Performance Comparison of Routing Protocols for wrecked ship scenario under Random Waypoint Mobility Model for MANET

Performance Comparison of Routing Protocols for wrecked ship scenario under Random Waypoint Mobility Model for MANET Advances in Wireless and Mobile Communications. ISSN 0973-6972 Volume 10, Number 5 (2017), pp. 1051-1058 Research India Publications http://www.ripublication.com Performance Comparison of Routing Protocols

More information

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1 Chapter 3 Part 2 Switching and Bridging Networking CS 3470, Section 1 Refresher We can use switching technologies to interconnect links to form a large network What is a hub? What is a switch? What is

More information

Simulation of Unsteady Water Film Flow on Pelton Bucket

Simulation of Unsteady Water Film Flow on Pelton Bucket Energy and Power Engineering, 2013, 5, 51-55 doi:10.4236/epe.2013.54b010 Published Online July 2013 (http://www.scirp.org/ournal/epe) Simulation of Unsteady ater Film Flow on Pelton Bucket Shen a School

More information

Early Measurements of a Cluster-based Architecture for P2P Systems

Early Measurements of a Cluster-based Architecture for P2P Systems Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella

More information

Objective. Introduction A More Practical Model. Introduction A More Practical Model. Introduction The Issue

Objective. Introduction A More Practical Model. Introduction A More Practical Model. Introduction The Issue Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks By Byron E. Thornton Objective We now begin to build a Wireless Sensor Network model that better captures the operational

More information

Computer Graphics. Chapter 4 Attributes of Graphics Primitives. Somsak Walairacht, Computer Engineering, KMITL 1

Computer Graphics. Chapter 4 Attributes of Graphics Primitives. Somsak Walairacht, Computer Engineering, KMITL 1 Computer Graphics Chapter 4 Attributes of Graphics Primitives Somsak Walairacht, Computer Engineering, KMITL 1 Outline OpenGL State Variables Point Attributes Line Attributes Fill-Area Attributes Scan-Line

More information

CS 229 Final Report: Location Based Adaptive Routing Protocol(LBAR) using Reinforcement Learning

CS 229 Final Report: Location Based Adaptive Routing Protocol(LBAR) using Reinforcement Learning CS 229 Final Report: Location Based Adaptive Routing Protocol(LBAR) using Reinforcement Learning By: Eunjoon Cho and Kevin Wong Abstract In this paper we present an algorithm for a location based adaptive

More information

VisualNet: General Purpose Visualization Tool for Wireless Sensor Networks

VisualNet: General Purpose Visualization Tool for Wireless Sensor Networks VisualNet: General Purpose Visualization Tool for Wireless Sensor Networks S. Rizvi and K. Ferens Department of Electrical and Computer Engineering University of Manitoba Winnipeg, Manitoba, Canada Ken.Ferens@ad.umanitoba.ca

More information

3. Cluster analysis Overview

3. Cluster analysis Overview Université Laval Multivariate analysis - February 2006 1 3.1. Overview 3. Cluster analysis Clustering requires the recognition of discontinuous subsets in an environment that is sometimes discrete (as

More information

Routing. 4. Mar INF-3190: Switching and Routing

Routing. 4. Mar INF-3190: Switching and Routing Routing 4. Mar. 004 1 INF-3190: Switching and Routing Routing: Foundations! Task! To define the route of packets through the network! From the source! To the destination system! Routing algorithm! Defines

More information

Learning the Three Factors of a Non-overlapping Multi-camera Network Topology

Learning the Three Factors of a Non-overlapping Multi-camera Network Topology Learning the Three Factors of a Non-overlapping Multi-camera Network Topology Xiaotang Chen, Kaiqi Huang, and Tieniu Tan National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy

More information

1 Proximity via Graph Spanners

1 Proximity via Graph Spanners CS273: Algorithms for Structure Handout # 11 and Motion in Biology Stanford University Tuesday, 4 May 2003 Lecture #11: 4 May 2004 Topics: Proximity via Graph Spanners Geometric Models of Molecules, I

More information

Algorithms for Euclidean TSP

Algorithms for Euclidean TSP This week, paper [2] by Arora. See the slides for figures. See also http://www.cs.princeton.edu/~arora/pubs/arorageo.ps Algorithms for Introduction This lecture is about the polynomial time approximation

More information

Study on Delaunay Triangulation with the Islets Constraints

Study on Delaunay Triangulation with the Islets Constraints Intelligent Information Management, 2010, 2, 375-379 doi:10.4236/iim.2010.26045 Published Online June 2010 (http://www.scirp.org/journal/iim) Study on Delaunay Triangulation with the Islets Constraints

More information

Performance of New Broadcast Forwarding Criteria in MANET

Performance of New Broadcast Forwarding Criteria in MANET Performance of New Broadcast Forwarding Criteria in MANET Lijuan Zhu 1, Bu-Sung Lee 1, Boon-Chong Seet 2, Kai-Juan Wong 3, Genping Liu 1, Shell-Ying Huang 1, and Keok-Kee Lee 1 1 Centre for Multimedia

More information

Thus, it is reasonable to compare binary search trees and binary heaps as is shown in Table 1.

Thus, it is reasonable to compare binary search trees and binary heaps as is shown in Table 1. 7.2 Binary Min-Heaps A heap is a tree-based structure, but it doesn t use the binary-search differentiation between the left and right sub-trees to create a linear ordering. Instead, a binary heap only

More information

Geometric Computations for Simulation

Geometric Computations for Simulation 1 Geometric Computations for Simulation David E. Johnson I. INTRODUCTION A static virtual world would be boring and unlikely to draw in a user enough to create a sense of immersion. Simulation allows things

More information

A Hole-Filling Algorithm for Triangular Meshes. Abstract

A Hole-Filling Algorithm for Triangular Meshes. Abstract A Hole-Filling Algorithm for Triangular Meshes Lavanya Sita Tekumalla, Elaine Cohen UUCS-04-019 School of Computing University of Utah Salt Lake City, UT 84112 USA December 20, 2004 Abstract Data obtained

More information

arxiv: v1 [cs.dc] 13 Oct 2008

arxiv: v1 [cs.dc] 13 Oct 2008 A SIMPLE LOCAL 3-APPROXIMATION ALGORITHM FOR VERTEX COVER VALENTIN POLISHCHUK AND JUKKA SUOMELA arxiv:0810.2175v1 [cs.dc] 13 Oct 2008 Abstract. We present a local algorithm (constant-time distributed algorithm)

More information

Data Mining Part 5. Prediction

Data Mining Part 5. Prediction Data Mining Part 5. Prediction 5.4. Spring 2010 Instructor: Dr. Masoud Yaghini Outline Using IF-THEN Rules for Classification Rule Extraction from a Decision Tree 1R Algorithm Sequential Covering Algorithms

More information

A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6

A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6 A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6 1 Hui Deng 2Xiaolong Huang 3Kai Zhang 3 Zhisheng Niu 1Masahiro Ojima 1R&D Center Hitachi (China) Ltd. Beijing 100004, China 2Dept.

More information

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks Ayad Salhieh Department of Electrical and Computer Engineering Wayne State University Detroit, MI 48202 ai4874@wayne.edu Loren

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing Jaekwang Kim Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon,

More information

Chapter 1. Introduction

Chapter 1. Introduction Introduction 1 Chapter 1. Introduction We live in a three-dimensional world. Inevitably, any application that analyzes or visualizes this world relies on three-dimensional data. Inherent characteristics

More information

New Holes and Boundary Detection Algorithm for Heterogeneous Wireless Sensor Networks

New Holes and Boundary Detection Algorithm for Heterogeneous Wireless Sensor Networks 163 New Holes Boundary Detection Algorithm for Heterogeneous Wireless Sensor Networks Ahmed M. Khedr 1 Arwa Attia 2 1 Computer Science Department, University of Sharjah, Sharjah 27272, UAE 1,2 Mathematics

More information

Sabareesan M, Srinivasan S*,John Deva Prasanna D S

Sabareesan M, Srinivasan S*,John Deva Prasanna D S Overall performance of Flooding Sequence Protocol in Wireless Sensor Networks Sabareesan M, Srinivasan S*,John Deva Prasanna D S Department of Computer Science and Technology, Hindustan University, Chennai,

More information

Spatial and multi-scale data assimilation in EO-LDAS. Technical Note for EO-LDAS project/nceo. P. Lewis, UCL NERC NCEO

Spatial and multi-scale data assimilation in EO-LDAS. Technical Note for EO-LDAS project/nceo. P. Lewis, UCL NERC NCEO Spatial and multi-scale data assimilation in EO-LDAS Technical Note for EO-LDAS project/nceo P. Lewis, UCL NERC NCEO Abstract Email: p.lewis@ucl.ac.uk 2 May 2012 In this technical note, spatial data assimilation

More information

L1 - Introduction. Contents. Introduction of CAD/CAM system Components of CAD/CAM systems Basic concepts of graphics programming

L1 - Introduction. Contents. Introduction of CAD/CAM system Components of CAD/CAM systems Basic concepts of graphics programming L1 - Introduction Contents Introduction of CAD/CAM system Components of CAD/CAM systems Basic concepts of graphics programming 1 Definitions Computer-Aided Design (CAD) The technology concerned with the

More information

Efficient Node Reconfiguration in Mobile Ad Hoc Networks (MANETs) for Wireless Internet Access Point Connection

Efficient Node Reconfiguration in Mobile Ad Hoc Networks (MANETs) for Wireless Internet Access Point Connection Efficient Node Reconfiguration in Mobile Ad Hoc Networks (MANETs) for Wireless Internet Access Point Connection Kin Choong Yow School of Computer Engineering Nanyang Technological University Nanyang Avenue,

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information

Announcements. HW3 is graded. Average is 81%

Announcements. HW3 is graded. Average is 81% CSC263 Week 9 Announcements HW3 is graded. Average is 81% Announcements Problem Set 4 is due this Tuesday! Due Tuesday (Nov 17) Recap The Graph ADT definition and data structures BFS gives us single-source

More information

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:

More information

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali

More information

EZR: Enhanced Zone Based Routing In Manet

EZR: Enhanced Zone Based Routing In Manet EZR: Enhanced Zone Based Routing In Manet Bency Wilson 1, Geethu Bastian 2, Vinitha Ann Regi 3, Arun Soman 4 Department of Information Technology, Rajagiri School of Engineering and Technology, Rajagiri

More information

Dynamics of Hot-Potato Routing in IP Networks

Dynamics of Hot-Potato Routing in IP Networks Dynamics of Hot-Potato Routing in IP Networks Jennifer Rexford AT&T Labs Research http://www.research.att.com/~jrex Joint work with Renata Teixeira (UCSD), Aman Shaikh (AT&T), and Timothy Griffin (Intel)

More information

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Fatiha Djemili Tolba University of Haute Alsace GRTC Colmar, France fatiha.tolba@uha.fr Damien Magoni University

More information

A Time-To-Live Based Reservation Algorithm on Fully Decentralized Resource Discovery in Grid Computing

A Time-To-Live Based Reservation Algorithm on Fully Decentralized Resource Discovery in Grid Computing A Time-To-Live Based Reservation Algorithm on Fully Decentralized Resource Discovery in Grid Computing Sanya Tangpongprasit, Takahiro Katagiri, Hiroki Honda, Toshitsugu Yuba Graduate School of Information

More information