Evaluation of an Enhanced Scheme for High-level Nested Network Mobility
|
|
- Pierce Sanders
- 5 years ago
- Views:
Transcription
1 IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan. A. Hashm Unversty of Albutana, Sudan IIUM, Malaysa Abstract Recently, wreless devces have been used sgnfcantly due to the contnuous and enormous servces that they provde. The Moblty Support has been desgned to acheve a permanent and contnung access to the Internet whle the wreless devces are roamng and changng ther ponts of attachment. One of the major challenges that arse s how to acheve seamless moblty and hgh network performance. The Internet Engneerng Task Force (IETF) has developed Moble IP, whch allows Moble node to be connected whle t s movng as well as functonng n foregn moble network zone usng ts orgnal IP address. IETF also n order to manage moblty of an entre network as sngle unt, they developed NEMO Basc Support Protocol (NEMO BS), whch allows Moble Routers to move and change ther pont of attachment. When a Moble Router connected to other moble router on foregn moble network, t makes a herarchcal structure known as nested moble network; nested moble network suffers from deferent problems due ts complexty structure. When the level of nestng becomes hgh, problems of tunnelng overhead are ncreased, whch wll produce hgh message delay and affect network performance. Many proposed schemes have been ntroduced to overcome nested network moblty ssues. However, novel efforts are requred. Ths research am to present and evaluate a new scheme to support nested network moblty especally n hgh level of nestng. The evaluaton of ths proposed scheme s done usng analytcal approach. The proposed scheme enhancement s benchmarked wth NEMO protocol and ROTIO approach wtch t based on IETF standers. The result obtaned had shown that the proposed scheme has better performance than the benchmark. Key words: Moble Network, Moble Router, Nested Moble Network, Performance 1. Introducton Wreless devces and wreless networkng technologes are drastcally grows recently, consequently, many electronc devces are capable to connect to the Internet usng ther own IP addresses, moble networkng becomes more applcable to varous scenaros. So the users are expected to be connected anywhere at any tme. However, network moblty s not supported as core functonalty n the TCP/IP stack, so addtonal mechansms are requred to support network moblty. Internet Engneerng Task Force (IETF) has ntated many protocols to support connectvty to these devces. Ths keeps the connecton whle the users are movng, not only to sngle devce but also to Moble Networks that are movng as a sngle unt. Moble Network contans multple moble nodes and other wreless devces (routers, swtches and hosts) that are capable to exchange the data between them,the topology of network defers from network to another dependng on the number and complexty of nodes. The archtecture of moble network can be Vehcular Area Network (VAN), a Personal Area Network (PAN) or a Body Area Network (BAN) whch requre access to the Internet. Hence, an effcent moblty management scheme s needed to provde contnuous servces for moble network as t changes ts pont of attachment to the Internet. To provde the moblty support, IETF has proposed MIPv6 for host moblty and network moblty Basc Support Protocol (NEMO- BS) [1], for a whole network moblty. NEMO enables moble nodes to move together as moble network usng moble router ()[2]. Moreover, t allows s from dfferent moble network to connect each other n form known as nested moble network (Nested Nemo). In NEMO [3]. Any s manly desgned to be connected to a partcular network or home network. Then the s gven a permanent IP address known as a home address (HoA). The s HoA, t s a constant address and t s not changng regardless of ts attachment pont n the Internet. When the s move from ts home network, and jon another network, packets addressed to the nodes of the home network are routed to the home network and a home agent (HA), a router n the home network manages all these packets. When the moble router attached to the foregn network, t gets an address known as care-of address (CoA) n foregn moble network. Then the moble router sends a bndng update (BU) message to ts HA wth the purpose of map the CoA wth ts HoA, after that, a bdrectonal tunnel between and HA s establshed. All packets are encapsulated and transferred to the moble node (MN) n home network through ths tunnel. receves the encapsulated packet and extracts the orgnal packet to MN. The man problem here s the addtonal IP header that are added and removed for purpose of tunnelng occur between s and Home Agents, whch may causes a lot of problems drectly affects the network performance. when there are many routers connected Manuscrpt receved October 5, 2015 Manuscrpt revsed October 20, 2015
2 2 IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 together, they are create herarchcal form known as Nested Network Moblty, whch s suffer from the Bdrectonal tunnelng overhead that are occurs multple tme dependng on level of nestng. Network moblty (NEMO) manages the movement of durng t changes the pont of attachment of the moble network n order to be connected to the nternet [1]. Therefore, t s very sgnfcant to acqure the hgh performance of moblty management protocol to accomplsh fast and seamless handoff wth lower delay and packet losses n NEMO envronment [4]. Network Moblty Support protocol s based on creatng bdrectonal tunnel between and ts Home Agent (HA), only should send the bndng update message (BU) wth the network prefx to provde Internet connectvty to all MNs. Followng ths technque hde the moblty of MNs and lmted the repeated regstraton of the MNs [4]. However, establshng of b-drecton tunnelng between the and t s HA for all communcatons causes on an ncreasng message sze because t s done by (IP-n-IP) encapsulaton. Ths ncreases handoff latency, packet loss, sgnalng cost and tunnelng overhead especally when the level of nestng s becomes hgh. 2. esgn of the Proposed Scheme for Hgh Level Nested Network Moblty In order to address the ssues related to the nested network moblty especally n case of hgh level nestng, an enhanced herarchal scheme have been proposed to overcome the overall performance ssues and support seamless moblty. The proposed scheme uses Herarchal archtecture that dvdes the doman under MAP nto multple sub domans dependng on the level of nestng. Therefore, ths technque reduces the transmsson cost, decreases the nested tunnels, enhances Intra doman routng perfectly; n addton to mprovng Message elay, and enhancng Handoff latency and Bndng Update. Ths scheme s smple to mplement, as t requres only slght change n the mplementaton of moble routers and moble nodes, no change s requred on home agents, correspondent node or any other network components. fgure 1 shows the proposed scheme and ts benefts.[5] Fgure 1 shows the map doman under TL, whch s dvded nto multple sub domans, so after each three levels of nestng a frst arrvng acts as sub doman TL (STL) that nherts all the features of orgnal TL. So all the operatons are done locally nsde a sub doman rather than on a whole doman. Ths way the path n between and a near TL becomes shorter whch gves an mportant advantage as llustrated n fgure 6. Each STL sends ts cache s contents to the orgnal TL usng sutable cache strategy technque. When correspondent node sent a message to ts the orgnal TL search ts cache s contents and set whch STL to receve a message, then the STL route the message to the. Fg. 1 the proposed scheme[43] 3. Proposed Scheme Operatons When vsts a network, t receves a Router Advertsement message from AR. the Advertsement message contans MAP opton of last STL to allow the to dscover STL address. Once the receves Router Advertsement messages wth the MAP opton that contans prefx nformaton for RCoA, t confgures two addresses, RCoA and LCoA by the stateless address confguraton mechansm. Rfc4041. Then As the bulds RCoA, the sends Local Bndng Update message to the STL. Upon recevng Local Bndng Update message, STL performs uplcate Address etecton (A) for RCoA. Then The STL returns a Bndng Acknowledgement message to the, to ndcate the result of the bndng update to the STL. Fnally The receves acknowledgement packet from STL contanng RCoA. Once the bndng update n STL s successfully completed, the STL updates the orgnal MAP cache. Hence, the orgnal MAP now s up to date wth the sub- doman s map contents. When HA and CNs sends a message to the, the orgnal MAP receves the message and searches ts cache to determne whch STL receves ths message. The targeted STL drectly routes the message to the. fgure 2 shows the scenaro of operatons. The proposed scheme provdes a short path to complete these operatons, so t gves low handoff latency, low transmsson delay, low messagng cost, low regstraton overhead and low sgnalng cost n comparson wth the prevous scenaros.
3 IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October Analytcal Evaluaton of The Proposed Scheme Fg. 2 the scenaro of proposed scheme operatons Fgure 3 shows the operaton of regstraton on the STL and snapshot of operaton n sub doman rather than a whole doman. Fg. 3 the operatons on the sub doman Fgure 4 shows the sgnalng follow of the proposed scheme. Fg. 4 the sgnalng follow of the proposed scheme Analytcal model has been developed to compare the packet transmsson delay and handoff latency of the proposed scheme wth selected benchmark. We have calculated the packet transmsson delay by summng up the lnk delay between CN and, lnk delay between HA and, processng delay at home agents, lnk delay between AR and, lnk delay between AR and TL, lnk delay at each sub doman and the lnk delay between and MN. We have also calculated the handoff latency by summng up the total delay of movement detecton, the total delay of duplcate address detecton at each sub doman TL and the total processng delay at each and lnk delay between each. Notatons The analytcal model uses the notaton shown n table 1 Table 1 the notatons of the analytcal model N The degree of nestng of whole doman M The degree of nestng nsde sub doman N The number of sub domans S TMLR The Processng delay of, +1 The lnk delay between and +1 L The processng delay of HA HA The lnk delay between correspondent node LCN and The processng delay of S_TL S The lnk delay between home agent and LHA The lnk delay between and Mn L MN The lnk delay between AR and LAR The lnk delay between AR and TMLR LAR TL The processng delay of movement detecton M The processng delay of duplcate A address detecton 4.1. Packet Transmsson elay We have calculated the packet transmsson delay by summng up the lnk delay between CN and, the lnk delay between HA and, and processng delay at home agents, the lnk delay between AR and, the lnk delay between AR and TL, lnk delay at each sub doman and lnk delay between and MN. Ths secton shows the equaton used to calculate the packet transmsson delay for each approach.
4 4 IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October Packet transmsson delay n NEMO. Equaton (1) [6] calculates the packet transmsson delay for NEMO approach as follows: Handoff latency of ROTIO. Equaton (6) [6] calculates the handoff latency n ROTIO Handoff latency of LBU Packet transmsson delay n ROTIO. Equaton (2) [6] calculates the packet transmsson delay n ROTIO approach as follows: Equaton (7) [7] calculates the handoff latency n LBU Handoff latency of proposed scheme. Equaton (8) calculates the handoff latency n proposed scheme as follow: Packet transmsson delay n LBU+. Equaton (3) [7] calculates the packet transmsson delay n LBU+ approach as follows: Packet transmsson delay n proposed scheme. Equaton (4) calculates the packet transmsson delay n proposed 4.2. Handoff latency The handoff latency s calculated by summng up the total delay of movement detecton and total delay of duplcate address detecton at each sub doman TL, the total processng delay at each, and the lnk delay between each. Ths secton shows the calculaton of the handoff latency for each approach Handoff latency of NEMO. Equaton (5) [7] calculates the handoff latency n NEMO 5. Result and dscusson Table 2 shows the system parameters values that are used to evaluate the proposed scheme. Table 2 the System parameters values Parameter value, +1 L HA LCN 50 ms S LHA ms L MN LAR LAR TL 100 ms LCN 50 ms M A 10s 5.1. Packet transmsson delay Fgure 5 shows that the packet transmsson delay produced by the proposed scheme s less than those proposed by other approaches.
5 IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October Fg 5 comparson of packet transmsson delay 5.2. Handoff latency. Fgure 6 shows that the handoff latency produced by the proposed scheme s less than those proposed by the other approaches. [3] Ernst, Therry. "Network moblty support termnology." Network (2007). [4] [Perera, Eranga, Vjay Svaraman, and Aruna Senevratne. "Survey on network moblty support." ACM SIGMOBILE Moble Computng and Communcatons Revew 8.2 (2004): [5] Al, Mohammed Babker, and Asha Hassan A. Hashm. "Improvng Message elay, Handoff latency and Bndng Update n Hgh level Nested Network Moblty." Internatonal Journal of Computer Scence and Network Securty (IJCSNS) 15.1 (2015): 27 [6] Cho, H., Kwon, T., and Y. Cho, "Route Optmzaton Usng Tree Informaton Opton for Nested Moble Networks", IEEE Journal On Selected Areas n Communcatons, Vol. 24, No. 9, , September [7] Senan, Shayma, et al. "Evaluaton of nested network moblty approaches." Appled Sc 11 (2011): Mohammed Babker Al Mohammed. Receved the B.Sc. egrees n Math and computer scence (statstcs/computer) from Gezra unversty faculty of math and computer scence n 2007 Sudan and M.Sc. n computer scence and nformaton from Gezra unversty faculty of Engneerng and Technology sudan Ph.. student at unversty of Sudan of scence and technology faculty of computer scence and nformaton technology Fg. 6 comparson of handoff latency 6. Concluson In ths paper, a novel scheme usng herarchcal structure has been proposed to overcome the performance problems that occur n nested network moblty n case of hgh degree of nestng level. An analytcal model for packet transmsson delay and handoff latency are developed and evaluated compared to the benchmarks. The result obtaned had shown that the proposed scheme has better performance than the benchmark. References [1] evarapall, Vjay, et al. Network moblty (NEMO) basc support protocol. RFC 3963, January, [2] Al-Surm, Ibrahm, Mohamed Othman, and Borhanuddn Mohd Al. "Moblty management for IP-based next generaton moble networks: Revew, challenge and perspectve." Journal of Network and Computer Applcatons 35.1 (2012):
IP mobility support is becoming very important as the
706 IEEE TRANSACTIONS ON COMPUTERS, VOL. 52, NO. 6, JUNE 2003 A New Scheme for Reducng Lnk and Sgnalng Costs n Moble IP Young J. Lee and Ian F. Akyldz, Fellow, IEEE Abstract IP moblty support s provded
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationConstructing Minimum Connected Dominating Set: Algorithmic approach
Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationSecurity Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments
Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationDEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS
DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261
More informationDUE to the rapid progress of wireless communication
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 2, NO. 3, JULY-SEPTEMBER 2003 207 An Effcent Fault-Tolerant Approach for Moble IP n Wreless Systems Jenn-We Ln and Joseph Arul, Member, IEEE Abstract Ths paper
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationEfficient Distributed File System (EDFS)
Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More information3D vector computer graphics
3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationReal-Time Guarantees. Traffic Characteristics. Flow Control
Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak
More informationA STUDY OF THE SCALABILITY AND PERFORMANCE OF MULTI-LEVEL HIERARCHY FOR SCALABLE MOBILITY MANAGEMENT IN WIRELESS IPv6 NETWORKS
A STUDY OF THE SCALABILITY AND PERFORMANCE OF MULTI-LEVEL HIERARCHY FOR SCALABLE MOBILITY MANAGEMENT IN WIRELESS IPv6 NETWORKS E.N. Onwua and Z. Nu State Key Lab on Mcrowave and Dgtal Communcaton Department
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationUsing Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol
2012 Thrd Internatonal Conference on Networkng and Computng Usng Partcle Swarm Optmzaton for Enhancng the Herarchcal Cell Relay Routng Protocol Hung-Y Ch Department of Electrcal Engneerng Natonal Sun Yat-Sen
More informationA Traffic Aware Routing Protocol for Congestion Avoidance in Content-Centric Network
, pp.69-80 http://dx.do.org/10.14257/jmue.2014.9.9.08 A Traffc Aware Routng Protocol for Congeston Avodance n Content-Centrc Network Jung-Jae Km 1, Mn-Woo Ryu 2*, S-Ho Cha 3 and Kuk-Hyun Cho 1 1 Dept.
More informationConnection-information-based connection rerouting for connection-oriented mobile communication networks
Dstrb. Syst. Engng 5 (1998) 47 65. Prnted n the UK PII: S0967-1846(98)90513-7 Connecton-nformaton-based connecton reroutng for connecton-orented moble communcaton networks Mnho Song, Yanghee Cho and Chongsang
More informationPositive Semi-definite Programming Localization in Wireless Sensor Networks
Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer
More informationAnalysis of Continuous Beams in General
Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationSecurity Vulnerabilities of an Enhanced Remote User Authentication Scheme
Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon
More informationEfficient Mobility Management in Different Wireless Network for Continuous Flow of Information
Effcent Moblty Management n Dfferent Wreless Network for Contnuous Flow of Informaton Mr. P.Thrunavukkarasu, Ms. P.Irene Berl Yazhn PG Scholar, Dept. of CSE, SRM Unversty, Chenna, Inda Assstant Professor,
More informationOverview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION
Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup
More informationConcurrent Apriori Data Mining Algorithms
Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng
More informationEfficient Load-Balanced IP Routing Scheme Based on Shortest Paths in Hose Model. Eiji Oki May 28, 2009 The University of Electro-Communications
Effcent Loa-Balance IP Routng Scheme Base on Shortest Paths n Hose Moel E Ok May 28, 2009 The Unversty of Electro-Communcatons Ok Lab. Semnar, May 28, 2009 1 Outlne Backgroun on IP routng IP routng strategy
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More informationReducing Frame Rate for Object Tracking
Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationThe Impact of Delayed Acknowledgement on E-TCP Performance In Wireless networks
The mpact of Delayed Acknoledgement on E-TCP Performance n Wreless netorks Deddy Chandra and Rchard J. Harrs School of Electrcal and Computer System Engneerng Royal Melbourne nsttute of Technology Melbourne,
More informationWightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK
Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your
More informationAvoiding congestion through dynamic load control
Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach
More informationA Frame Packing Mechanism Using PDO Communication Service within CANopen
28 A Frame Packng Mechansm Usng PDO Communcaton Servce wthn CANopen Mnkoo Kang and Kejn Park Dvson of Industral & Informaton Systems Engneerng, Ajou Unversty, Suwon, Gyeongg-do, South Korea Summary The
More informationMobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks
Moblty Based Routng Protocol wth MAC Collson Improvement n Vehcular Ad Hoc Networks Zhhao Dng, Pny Ren, Qnghe Du Shaanx Smart Networks and Ubqutous Access Rearch Center School of Electronc and Informaton
More informationmquest Quickstart Version 11.0
mquest Quckstart Verson 11.0 cluetec GmbH Emmy-Noether-Straße 17 76131 Karlsruhe Germany www.cluetec.de www.mquest.nfo cluetec GmbH Karlsruhe, 2016 Document verson 5 27.04.2016 16:59 > Propretary notce
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationSynchronous Distributed Wireless Network Emulator for High-Speed Mobility: Implementation and Evaluation
Synchronous Dstrbuted Wreless Network Emulator for Hgh-Speed Moblty: Implementaton and Evaluaton Mnoru Kozum, Tomoch Ebata Yokohama Research Laboratory, Htach, Ltd., 292 Yoshda-cho, Totsuka-ku, Yokohama,
More informationIP Camera Configuration Software Instruction Manual
IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the
More informationA KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE
A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs
More informationQuantifying Performance Models
Quantfyng Performance Models Prof. Danel A. Menascé Department of Computer Scence George Mason Unversty www.cs.gmu.edu/faculty/menasce.html 1 Copyrght Notce Most of the fgures n ths set of sldes come from
More informationkccvoip.com basic voip training NAT/PAT extract 2008
kccvop.com basc vop tranng NAT/PAT extract 28 As we have seen n the prevous sldes, SIP and H2 both use addressng nsde ther packets to rely nformaton. Thnk of an envelope where we place the addresses of
More informationEnhanced Watermarking Technique for Color Images using Visual Cryptography
Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS
More informationReclaiming the Brain: Useful OpenFlow Functions in the Data Plane
Reclamng the Bran: Useful OpenFlow Functons n the Data Plane Lron chff (Tel Avv Un, Israel) Mchael Borokhovch (UT Austn, Unted tates) tefan chmd (TU Berln & T-Labs, Germany) My Talk n One lde eparaton
More informationA MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS
Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung
More informationA Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks
A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More informationConditional Speculative Decimal Addition*
Condtonal Speculatve Decmal Addton Alvaro Vazquez and Elsardo Antelo Dep. of Electronc and Computer Engneerng Unv. of Santago de Compostela, Span Ths work was supported n part by Xunta de Galca under grant
More informationMODULE DESIGN BASED ON INTERFACE INTEGRATION TO MAXIMIZE PRODUCT VARIETY AND MINIMIZE FAMILY COST
INTERNATIONAL CONFERENCE ON ENGINEERING DESIGN, ICED 07 28-31 AUGUST 2007, CITE DES SCIENCES ET DE L'INDUSTRIE, PARIS, FRANCE MODULE DESIGN BASED ON INTERFACE INTEGRATION TO MAIMIZE PRODUCT VARIETY AND
More informationF Geometric Mean Graphs
Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 2 (December 2015), pp. 937-952 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) F Geometrc Mean Graphs A.
More informationAn Improved User Authentication and Key Agreement Scheme Providing User Anonymity
35 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 0 An Improved User Authentcaton and Key Agreement Scheme Provdng User Anonymty Ya-Fen Chang and Pe-Yu Chang Abstract When accessng
More informationParallel and Distributed Association Rule Mining - Dr. Giuseppe Di Fatta. San Vigilio,
Parallel and Dstrbuted Assocaton Rule Mnng - Dr. Guseppe D Fatta fatta@nf.un-konstanz.de San Vglo, 18-09-2004 1 Overvew Assocaton Rule Mnng (ARM) Apror algorthm Hgh Performance Parallel and Dstrbuted Computng
More informationMeta-heuristics for Multidimensional Knapsack Problems
2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,
More informationSolving two-person zero-sum game by Matlab
Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by
More informationPriority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks
Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,
More informationARTICLE IN PRESS. Signal Processing: Image Communication
Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationDelay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks
Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network
More informationResearch Article Energy Efficient Interest Forwarding in NDN-Based Wireless Sensor Networks
Moble Informaton Systems Volume 2016, Artcle ID 3127029, 15 pages http://dx.do.org/10.1155/2016/3127029 Research Artcle Energy Effcent Interest Forwardng n NDN-Based Wreless Sensor Networks Shua Gao, 1
More informationLecture 5: Multilayer Perceptrons
Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented
More informationNew Method Based on Priority of Heterogeneous Traffic for Scheduling Techniques in M2M Communications over LTE Networks
Receved: July 28, 2018 209 New Method Based on Prorty of Heterogeneous Traffc for Schedulng Technques n M2M Communcatons over LTE Networks Maryam Ouassa 1 * Abdallah Rhattoy 2 1 Informaton and Communcaton
More informationParallel matrix-vector multiplication
Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more
More informationHigh-Boost Mesh Filtering for 3-D Shape Enhancement
Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,
More informationUsing Fuzzy Logic to Enhance the Large Size Remote Sensing Images
Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract
More informationQoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding
Tarno et al. EURASIP Journal on Wreless Communcatons and Networkng 214, 214:81 http://wcn.euraspournals.com/content/214/1/81 RESEARCH Open Access QoS-aware routng for heterogeneous layered uncast transmssons
More informationImproved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment
JOURNAL OF COMPUTERS, VOL. 4, NO. 9, SEPTEMBER 2009 873 Improved Resource Allocaton Algorthms for Practcal Image Encodng n a Ubqutous Computng Envronment Manxong Dong, Long Zheng, Kaoru Ota, Song Guo School
More informationVirtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory
Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process
More informationAdvanced radio access solutions for the new 5G requirements
Advanced rado access solutons for the new 5G requrements Soumaya Hamouda Assocate Professor, Unversty of Carthage Tuns, Tunsa Soumaya.hamouda@supcom.tn IEEE Summt 5G n Future Afrca. May 3 th, 2017 Pretora,
More informationApplication of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling
, pp.40-45 http://dx.do.org/10.14257/astl.2017.143.08 Applcaton of Improved Fsh Swarm Algorthm n Cloud Computng Resource Schedulng Yu Lu, Fangtao Lu School of Informaton Engneerng, Chongqng Vocatonal Insttute
More information6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour
6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the
More informationTECHNICAL REPORT AN OPTIMAL DISTRIBUTED PROTOCOL FOR FAST CONVERGENCE TO MAXMIN RATE ALLOCATION. Jordi Ros and Wei K Tsai
TECHNICAL REPORT AN OPTIMAL DISTRIUTED PROTOCOL FOR FAST CONVERGENCE TO MAXMIN RATE ALLOCATION Jord Ros and We K Tsa Department of Electrcal and Computer Engneerng Unversty of Calforna, Irvne 1 AN OPTIMAL
More informationProfessional competences training path for an e-commerce major, based on the ISM method
World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng
More informationAdaptive Energy and Location Aware Routing in Wireless Sensor Network
Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}
More informationOptimal Distribution of Remotely-Subscribed Multicast Traffic within a Proxy Mobile IPv6 Domain by Using Explicit Multicast
ptmal strbuton of Remotely-Subscrbed Multcast Traffc wthn a Proxy Moble v6 oman by Usng Explct Multcast us M. Contreras *, Carlos J. Bernardos * Core Networ Evoluton Telefónca I+ on Ramón de la Cruz, 82-84,
More informationHigh Utility Video Surveillance System on Public Transport using WiMAX technology
Edth Cowan Unversty Research Onlne ECU Publcatons Pre. 2011 2010 Hgh Utlty Vdeo Survellance System on Publc Transport usng WMAX technology Iftekhar Ahmad Edth Cowan Unversty Daryoush Habb Edth Cowan Unversty
More informationJTCP: Congestion Distinction by the Jitter-based Scheme over Wireless Networks
JTCP: Congeston stncton by the Jtter-based Scheme over Wreless Networks Erc Hsao-Kuang Wu, Mng-I Hseh, Me-Zhen Chen and Shao-Y Hung ept. of Computer Scence and Informaton Engneerng, Natonal Central Unversty,
More informationProtection Switching Methods for Point-to-Multipoint Connections in Packet Transport Networks
Protecton Swtchng Methods for Pont-to-Multpont Connectons n Packet Transport Networks Dae-Ub Km, Jeong-dong yoo, Jong Hyun Lee, Byung Chul Km, and Jae Yong Lee In ths paper, we dscuss the ssues of provdng
More informationWishing you all a Total Quality New Year!
Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma
More informationSkew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach
Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research
More informationSome material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier
Some materal adapted from Mohamed Youns, UMBC CMSC 611 Spr 2003 course sldes Some materal adapted from Hennessy & Patterson / 2003 Elsever Scence Performance = 1 Executon tme Speedup = Performance (B)
More informationPERFORMANCE EVALUATION OF VOICE OVER IP USING MULTIPLE AUDIO CODEC SCHEMES
ISSN 1819-668 www.arpnjournals.com PERFORMANCE EVALUATION OF VOICE OVER IP USING MULTIPLE AUDIO CODEC SCHEMES L. Audah 1, A.A.M. Kamal 1, J. Abdullah 1, S.A. Hamzah 1 and M.A.A. Razak 2 1 Optcal Communcaton
More informationExtending Network Life by Using Mobile Actors in Cluster-based Wireless Sensor and Actor Networks
Extendng Networ Lfe by Usng Moble Actors n Cluster-based Wreless Sensor and Actor Networs Nauman Aslam, Wllam Phllps, Wllam Robertson and S. Svaumar Department of Engneerng Mathematcs & Internetworng Dalhouse
More informationHIERARCHICAL SCHEDULING WITH ADAPTIVE WEIGHTS FOR W-ATM *
Copyrght Notce c 1999 IEEE. Personal use of ths materal s permtted. However, permsson to reprnt/republsh ths materal for advertsng or promotonal purposes or for creatng new collectve wors for resale or
More informationA Topology-aware Random Walk
A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble
More informationNetwork Coding as a Dynamical System
Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.
More informationPerformance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks
Communcatons and Network, 2016, 8, 45-55 Publshed Onlne February 2016 n ScRes. http://www.scrp.org/journal/cn http://dx.do.org/10.4236/cn.2016.81006 Performance Comparson of a QoS Aware Routng Protocol
More informationAN INDEXING METHOD FOR SUPPORTING SPATIAL QUERIES IN STRUCTURED PEER-TO-PEER SYSTEMS
AN INDEXING METHOD FOR SUPPORTING SPATIAL QUERIES IN STRUCTURED PEER-TO-PEER SYSTEMS Lngku Meng a, Wenun Xe a, *, Dan Lu a, b a School of Remote Sensng and Informaton Engneerng, Wuhan Unversty, Wuhan 4379,
More informationA New Transaction Processing Model Based on Optimistic Concurrency Control
A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,
More informationComplex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.
Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal
More informationAn enhanced dynamic-id-based remote user authentication protocol with smart card
Internatonal Journal of Engneerng Advanced Research Technology (IJEART) ISSN: 2454-9290 Volume-2 Issue-4 Aprl 206 An enhanced dynamc-id-based remote user authentcaton protocol wth smart card aoran Chen
More informationOPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET
OPTIMAL CONFIGURATION FOR NODE IN MIED CELLULAR AND MOBILE AD HOC NETWORK FOR INET Olusola Babalola D.E. Department of Electrcal and Computer Engneerng Morgan tate Unversty Dr. Rchard Dean Faculty Advsor
More informationSteps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices
Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between
More informationDistributed Grid based Robust Clustering Protocol for Mobile Sensor Networks
414 The Internatonal Arab Journal of Informaton Technology, Vol. 8, No. 4, October 011 Dstrbuted Grd based Robust Clusterng Protocol for Moble Sensor Networks Shahzad Al and Sajjad Madan Department of
More informationDetermining the Optimal Bandwidth Based on Multi-criterion Fusion
Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn
More informationEnhanced AMBTC for Image Compression using Block Classification and Interpolation
Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa
More informationChapter 6 Programmng the fnte element method Inow turn to the man subject of ths book: The mplementaton of the fnte element algorthm n computer programs. In order to make my dscusson as straghtforward
More information