Capability-Aware Object Management based on Skip List in Large-Scale Heterogeneous P2P Networks

Size: px
Start display at page:

Download "Capability-Aware Object Management based on Skip List in Large-Scale Heterogeneous P2P Networks"

Transcription

1 Takash Tommoto, Takuj Tachbana, Kenj Sugmoto Capablty-ware Object Management based on Skp Lst n Large-Scale Heterogeneous PP Networks TKSHI TOMIMOTO, TKUJI TCHIBN, KENJI SUGIMOTO Graduate School of Informaton Scence Nara Insttute of Scence and Technology 86-5 Takayama, Ikoma, Nara 63- JPN E-mal: {takuj-t,kenj@s.nast.jp bstract: - In ths paper, we propose an object management method n large-scale heterogeneous PP networks. In the proposed method, objects can be stored n and searched from nodes by consderng node's capabltes. The proposed system s based on skp lst, and two dentfcatons are utlzed; and HashID. The s used to specfy each node's capabltes, on the other hand, HashID s used for provdng load balancng among nodes wth smlar capabltes. ccordng to the two dentfcatons, message routng for storng and searchng objects s performed. We evaluate the performance of the proposed method by smulaton, and we nvestgate the effectveness of the method. Numercal examples show that the proposed method can manage objects based on node's capabltes and can provde the scalablty when the number of nodes s large and the dfference n node's capabltes s large. Key-Words: - Peer-to-Peer networks, Skp lst, DHT, Heterogeneous networks, Object management Introducton Peer-to-peer (PP) networks have been wdely used over the Internet for varous applcatons such as Internet telephony [], dstrbuted data storages [], data streamng [3], and onlne games [4].The numbers of PP users and objects ncrease year by year, and n order to manage a large number of users and objects, structured PP networks based on dstrbuted hash table (DHT) have emerged, ncludng Chord [5] and Pastry [6]. In the DHT-based PP networks, a key s assgned to each node and each object. n object s stored n a node whose key s closest to the object's key. In addton, an objectve s searched from a node whose key s closest to the object's key. By usng a hash functon for the key assgnment, the load balancng can be provded among partcpatng nodes. Moreover, the dfference n node's capabltes becomes large year by year [7,8]. For example, multmeda fle sharng, traffc/weather predcton, and stress level montorng of buldngs are just begnnng to be utlzed by moble hand-held devces or sensor nodes [-]. In the future, t s ndspensable to buld large-scale heterogeneous PP networks. Fg. shows a large-scale heterogeneous PP network where several types of objects are utlzed. Map Photo Musc Fg. : Heterogeneous PP network for multple applcatons. In such PP network, t s expected that each object s stored n a node whose capabltes satsfy the requrement of the object. In addton, t s expected that each object s searched from a node whose capabltes satsfy the requrement of the object. For example, musc fles should be stored n hghperformance computers and temperature data should be searched from sensor nodes. Hence, objects should be managed by consderng node's capabltes. In ths paper, we propose an object management method that s used n large-scale heterogeneous PP networks. In the proposed method, objects can be stored n and searched from nodes by consderng node's capabltes. Ths proposed method s based on skp lst []. In the capablty-aware object management, two dentfcatons are utlzed; and HashID. ISSN: Issue 5, Volume, May

2 Takash Tommoto, Takuj Tachbana, Kenj Sugmoto s assgned to each node accordng to ts own capabltes such as forwardng speed, data storage, moblty, and avalablty. It s also assgned to each object accordng to capabltes of node whch the object should be stored n or searched from. On the other hand, HashID s assgned to each node and each object wth a hash functon. When an object s stored n or searched from a node accordng to pre-specfed and HashID, message routng s performed based on the two dentfcatons. Frst, accordng to, a message s routed to one of the nodes whose s are the same as the pre-specfed. Then, the message s routed accordng to HashID, and fnally the message s receved by a node whose HashID s closest to the pre-specfed HashID. By usng the proposed method, t s expected that each object can be managed accordng to node's capabltes based on and that the load balancng can be provded based on HashID. In addton, ths method has hgh scalablty for heterogeneous envronments. We evaluate the performance of the proposed method by smulaton, and we nvestgate the effectveness of ths method. Moreover, we evaluate ts performance over physcal networks. Note that our proposed routng algorthms and smulaton results have been updated from those n our prevous works [3]. The rest of the paper s organzed as follows. Secton descrbes PP system based on skp lst, and Secton 3 explans the proposed capabltyaware object management. Numercal examples are shown n Secton 4 and fnally, conclusons are presented n Secton 5. PP System based on Skp Lst Skp lst has been proposed as a randomzed balanced tree data structure []. In ths data structure, each data has a specfc key and every data s sorted by key. Fg. shows an example of skp lst wth three levels. s shown n ths fgure, every data s doubly lnked n ncreasng order by key at level, and at level ( ), each data n level appears n level wth probablty p ( p ). The lsts at hgher level allow the sequence of data to be traversed quckly. Therefore, when data wth a partcular key s searched, the searchng process s performed at hgher level. Recently, data structures smlar to the skp lst have been utlzed n large-scale PP networks; skp graph [4] and SkpNet [5]. PP nodes n the two networks correspond to data n the skp lst. s H E D 4 7 shown n Fg. 3, n a skp graph wth h ( h ) levels, each PP node has a specfc key and all nodes are doubly lnked n ncreasng order by key at level, as s the case wth the skp lst. t level ( h), there are one or more doubly lnked lsts and each node belongs to one of the lsts. Each node has an dentfcaton called membershp vector n addton to ts own key, and a lst where a node belongs at level s determned by ts own membershp vector. On the other hand, n the SkpNet, rng data structure s used nstead of lst data structure. Fg. 4 shows an example of SkpNet wth four levels. s shown n ths fgure, there are one or more rngs at each level, and rngs at level are obtaned by splttng a rng at level nto two dsjont sets. Each node has two dentfcatons called name ID and numerc ID, and a node belongs to one of the rngs at each level accordng to ts own numerc ID. In every rng, nodes are sorted by name ID. In both the skp graph and SkpNet, message routng s performed accordng to the two dentfcatons. message can be transmtted to a node wth pre-specfed dentfcatons. By usng the dentfcatons effectvely, the skp graph and SkpNet can provde several functons such as object storage, path localty, and constraned load balancng for large-scale PP networks. 3 Proposed Method In ths paper, we propose a capablty-aware object management n large-scale heterogeneous PP networks. The proposed method s based on the skp 6 Fg. : Skp lst wth three levels Lnk 3 38 Lnk 5 4 Lnk 45 Lnk Lnk Lnk Lnk Lnk Lnk Route lnk Membershp vector Fg. 3: Routng mechansms for a skp graph. T I L Level 3 Level Level Level ISSN: Issue 5, Volume, May

3 Takash Tommoto, Takuj Tachbana, Kenj Sugmoto Rng Rng Rng Rng Rng Rng Rng Rng Numerc ID Rng Rng 38 Rng Rng 5 3 Lv CW CCW Routng table Rng Rng Name ID Root rng 45 Level 3 Level Level Level lst n order to consder node's capabltes, and rng data structure s used as s the case wth SkpNet for the effcent message routng. In the followng, we explan our proposed method n terms of ID assgnment, node structure, message routng, and an example of use. 3. ID ssgnment The proposed method utlzes two dentfcatons called and HashID. and HashID correspond to name ID and numerc ID n SkpNet, respectvely. The s assgned to each node for specfyng ts capabltes such as forwardng capablty, data-storage capablty, moblty, and avalablty. In ths paper, for the smplcty, we assume that four-dgt ( w, x, y, z) s used as follows. Frst dgt (w) : Forwardng capablty Second dgt (x) : Data-storage capablty Thrd dgt (y) : Moblty Fourth dgt (z) : valablty Here, the number of dgts of can be changed dependng on how many capabltes should be consdered, and a capablty can be denoted wth more than one dgt n order to represent the capablty n more detal. Table shows an example about how each dgt number s determned. When the forwardng capablty C (w) s. Gbps, data-storage capablty C (x) s 5 Gbytes, moblty C (y) s low, and avalablty C(z) s hgh for a hgh-performance computer, s set to wxyz (see Fg. 5(a)). In the case of a cell-phone whose C (w) s.4 Mbps, C (x) s 5 Mbytes, C (y) s hgh, and C (z) s Name ID routng Numerc ID routng Fg. 4: Data structure and message routng n SkpNet. Table : ssgnment of four-dgt. w C ( w) Gbps C ( w) Gbps x C ( x) 5 Gbytes C ( x) 5 Gbytes y C( y) low C( y) hgh z C(z) hgh C(z) low C(w):. Gbps C(x): 5 Gbytes C(y): low C(z): hgh (a) Hgh-performance computer. C(w):.4 Mbps C(x): 5 Mbytes C(y): hgh C(z): hgh (b) Cell-phone. Fg. 5: assgnment. : : IP address.68.. HashID: Hash functon Fg. 6: HashID assgnment. hgh, of ths node s set to wxyz (see Fg. 5(b)). On the other hand, HashID s assgned to each node by applyng a collson-resstant hash functon to ts IP address or others. For example, HashID of the hgh-performance computer n Fg. 5(a) s set to based on ts IP address (see Fg. 6). Moreover, a character : s used for each node n order to dscrmnate ts own and HashID as :HashID. In the case of Fg. 5(a) and Fg. 6, ths hgh-performance computer s denoted as :. 3. Node Structure Fg. 7 shows a node structure for the capabltyaware object management n a case of four-dgt. In ths structure, there are one or more rngs at each level, and rngs at level are obtaned by splttng a rng at level nto multple dsjont sets. The number of levels s H when the number of dgts of HashID s H. Each node belongs to a rng at every level so that -dgts prefx of HashID s shared by other nodes. ISSN: Issue 5, Volume, May

4 Takash Tommoto, Takuj Tachbana, Kenj Sugmoto Rng Rng Rng Rng Level routng Rng Rng Level Lv CW CCW Routng table Root rng HashID routng Level Fg. 7: Node structure and message routng based on and HashID. For example, a node whose the frst dgt of HashID s belongs to Rng at level. Because nodes are sorted by at each rng, nodes wth the same,.e., smlar capabltes, are located n a rng sequentally. Here, the number of nodes n a top-level rng s one f all nodes have dfferent HashID. s the level becomes low, the number of nodes n a rng becomes large. Therefore, by usng hgher-level rngs, messages are traversed to a node quckly. Under ths node structure, each node has a routng table whch ncludes neghbor nodes at each level (see node n Fg. 7). Ths routng table s used for message routng, whch s explaned n the next subsecton. 3.3 Message Routng In the proposed method, message routng for storng and searchng an object s performed based on and HashID. Moreover, message routng for node jon and departure procedures s also performed based on the two dentfcatons. Fgs. 8 and show two message routng algorthms. In the followng, we explan the routng algorthms n a case where a source node sends a message to a destnaton node. t frst, the source node starts message routng based on as shown n Fg. 8 (sold lnes n Fg. 7). If the of the source node shares some common prefxes wth that of the destnaton node, the source node determnes a drecton of message routng from both ts own and destnaton node's (see () of Fg. 8). In Fg. 8, clockwse drecton s denoted as true and counter clockwse drecton s denoted as false. On the other hand, f the source and the destnaton SendMsg(, HashID, msg) { f(longestprefx(, localnode.) == ) msg.dr = RandomDrecton(); else f( < localnode.) msg.dr = false; // CounterClockwse else msg.dr = true; // Clockwse msg. = ; msg.hashid = HashID; RouteBy(msg); RouteBy(msg) { h = localnode.maxroutngtableheght; (B) whle(h >= ) { f(lesbetween(msg.dr, localnode., localnode.routngtable.[h][msg.dr]., msg. ) == false ) { h--; contnue; () (C) f(lesbetween(msg.dr, localnode., localnode.routngtable.[h][msg.dr]., msg. ) == true ) (D) { NextCanddateNode = localnode.routngtable.[h][msg.dr]; f(checkiflreadyvsted(msg, NextCanddateNode)) (E) { h--; contnue; msg.lreadyvsted(localnode); SendtoNode(NextCanddateNode, msg); (F) return; f( localnode.!= msg. ) (G) { Negatveck(msg); return; msg.dr = true; RouteByHashID(msg); (H) Fg. 8: Routng algorthm based on. ISSN: Issue 5, Volume, May

5 Takash Tommoto, Takuj Tachbana, Kenj Sugmoto RouteByHashID(msg) { f( msg.hashid == localnode.hashid msg.fnaldestnaton == true ) { () DelverMessage(msg); return; f(msg.startnode!= null && localnode == msg.startnode ) { (B) msg.fnaldestnaton = true; SendtoNode(msg.bestNode); return; h = CommonPrefxLen(msg.HashID, localnode.hashid); (C) f( h > msg.rnglvl) { msg.rnglvl = h; msg.startnode = msg.bestnode = localnode; f( abs(localnode.hashid - msg.hashid) < abs(msg.bestnode.hashid - msg.hashid) ){ (D) msg.bestnode = localnode; f( localnode.routngtable[h][msg.dr]. == msg. ){ (E) SendtoNode(msg, localnode.routngtable[h][msg.dr]); else f( msg.dr == true ){ (F) msg.fnaldestnaton = false; msg.startnode = null; msg.dr = false; SendtoNode(msg, localnode); else f( msg.dr == false ) { (G) msg.fnaldestnaton(true); SendtoNode(msg, msg.bestnode); Fg. : Routng algorthm based on HashID. have no common prefx, a routng drecton s selected at random. Then, along the selected drecton, the source node tres to fnd a canddate of the next node from the top-level ponter n ts own routng table (see (B)), and f such a node cannot be found, the level of ponter s decreased (see (C)). By usng hgher level ponter preferentally, as s the case wth the skp lst, the message reaches the destnaton node quckly. When a canddate of the next node s found, the current node checks whether the canddate node has already receved the message (see (D) and (E)). If the node has receved the message prevously, the source node tres to fnd a new canddate of the next node from lower level ponter agan. Otherwse, the source node sends the message to the canddate node as the next node (see (F)). Ths process contnues untl the message s receved by a node whose s the same as the destnaton. When the message arrves at a node wth destnaton, the message routng based on termnates (see (H)). If there s no node wth destnaton, ths message routng fals and negatve acknowledgment s sent back to the source node (see (G)). Note that n the actual system, a message wll reach a node wth the closest. () () (a) Lst structure. () () (b) Rng structure. However, ths s out of scope n ths paper because t depends on the mplementaton. Just after the termnaton of the message routng based on, message routng based on HashID starts as shown n Fg. (dotted lnes n Fg. 7). Ths message routng s performed only among nodes wth the destnaton. Note that the message tends to be routed n a lst structure at most of rngs (see Fg. (a)) but the message may be routed n a rng structure at hgher-level rng (see Fg. (b)). In the message routng based on HashID, at frst, the node checks the number of dgts whch are shared between ts own HashID and the destnaton HashID (see (C)). When the number of shared dgts s h, the message routng starts at level h. The ntal routng drecton s set to true n Fg. 8. The node checks whether of the neghbor node s the same as ts own. If the neghbor node has the same, the node forwards the message to the neghbor node (see (E) of Fg. and () of Fg. ). t ths tme, when HashID of the neghbor node s closer to the destnaton HashID than ts own HashID, the nformaton about the neghbor node s stored n the message as the best node (see (D)). When the neghbor node has a dfferent, the current node reverses the routng drecton and contnues the message routng (see (F) of Fg. and () of Fg. (a)). The message routng based on HashID termnates when the node wth the destnaton HashID s found (see ()), when the message routng for both drectons fnshes (see (G) of Fg. and (3) of Fg. (a)), or when a node receves the message agan n the ntal drecton (see (B) of Fg. and () of Fg. (b)). In order to decrease the number of hops for message routng over physcal networks, we have to consder the network proxmty n our message (3) Fg. : Node structure for message routng based on HashID. ISSN: Issue 5, Volume, May

6 Takash Tommoto, Takuj Tachbana, Kenj Sugmoto Rng Rng Rng Rng Rng Rng Root rng Fg. : Example of object management where car node downloads an object from server node B. routng algorthm. However, ths s out of scope because some solutons have been proposed n [5] and those are avalable n our method. 3.4 Example of Use Fg. shows a PP network where several types of nodes have partcpated by usng a PP software wth our proposed method. In ths network, we assume that musc fles have been stored n hghperformance fle servers. That s, of musc fle s the same as that of hgh-performance fle server. For example, when a drver (car node ) tres to lsten to a favorte song, the drver nputs ts ttle and fle type nto the software. In ths software, of the musc fle s determned from ts fle type, and HashID s determned wth a hash functon from ts ttle. Then, message routng starts n the PP network to fnd a destnaton node wth the musc fle based on the determned and HashID. If the message reaches the destnaton node (server node B), the drver can download the object from ths node. If a DHT-based PP network s bult for each node type,.e., for each n our method, a smlar object management may be mplemented. However, ths mplementaton requres that each node has at least a ponter to each PP network. Therefore, the number of ponters becomes large when the number of node types becomes large. On the other hand, n our proposed method, each node has only nformaton about neghbor node's s. Therefore, n the future, t s expected that the proposed method s effectve n large-scale heterogeneous PP networks. B B B 4 Numercal Examples In ths secton, we evaluate the performance of the proposed method by smulaton. We assume that the number of PP nodes s N and the number of objects s M. We consder how M objects are stored n N nodes by usng the proposed method. In ths PP network, a four-dgt s assgned to each node and each object. For the smplcty, n the followng, we denote four-dgt wth decmal number format, for example, s denoted as 5. We assume that ( 5) s assgned to a node (an object) wth probablty ( ). On the other hand, HashID s denoted as 8 bts bnary strng, and t s assgned to a node (an object) wth a hash functon. Under ths stuaton, we evaluate by smulaton the performance of the proposed capablty-aware object management. In order to perform the performance comparson, we also evaluate the performance of a conventonal DHT-based method where node's capabltes are not consdered. 4. Impact of ssgnment for Object Frst, we nvestgate the mpact of assgnment for each object. Here, the number of nodes s N 6384, and ( 5) s assgned to a node wth probablty / 6. In addton, we assume that the number of objects s M 5. Here, we consder two cases for probablty wth whch ( 5) s assgned to each object. In case,.5,., 3 4.5, 5 4., and 5.. That s, about half of objects should be stored n nodes wth but no object should be stored n nodes wth 5. On the other hand, n case,.,.,.5, 3 4., and 5.5. In ths case, about half of objects should be stored n nodes wth 5 but no object should be stored n nodes wth. Fg. (a) shows the total number of objects whch are stored n nodes wth n the case. From Fg. (a), we fnd that by usng the conventonal method, objects are stored n all nodes randomly regardless of those capabltes. s a result, n the conventonal method, capabltes of each node are never consdered, as expected. On the other hand, we fnd that each object can be stored n N nodes accordng to by usng the proposed method. For example, nodes wth stores about half of objects and nodes wth ISSN: Issue 5, Volume, May

7 Takash Tommoto, Takuj Tachbana, Kenj Sugmoto Number of objects 3 Conventonal method 5 Capablty-aware management Number of objects Conventonal method Capablty-aware management (a) Total number of objects stored n nodes wth each n case. Number of objects 3 Conventonal method Capablty-aware 5 management (a) Total number of objects stored n nodes wth each. Number of objects.5 Conventonal method. Capablty-aware management (b) Total number of objects stored n nodes wth each n case. Fg. : Impact of assgnment for each object. 5 stores no object. Therefore, the proposed method can manage objects by consderng node's capabltes. Note that n all the results for the proposed method, an object wth has been stored n a node wth necessarly. Fg. (b) also shows the total number of objects n the case. From ths fgure, we fnd that objects can be stored n nodes wth pre-specfed capabltes by usng the proposed method. However, n the conventonal method, objects are stored n all nodes randomly regardless of. Therefore, the proposed method s effectve n heterogeneous envronments. 4. Impact of ssgnment for Node Next, we nvestgate the mpact of assgnment for each node. In ths subsecton, the (b) verage number of objects stored n nodes wth each. Fg. 3: Impact of assgnment for each node. number of nodes s N 6384 and the number of objects s M 5. Fg. 3(a) shows the total number of objects that are stored n nodes wth, and Fg. 3(b) shows the average number of objects. Here,.,.5,., 3., 4.8, 5.7, 6.6, 7.5, 8.4,.3, 3., and That s, the number of nodes wth decreases as becomes large. On the other hand, s assgned to each object wth probablty /6. Hence, more or less the same number of objects should be stored evenly for each. From Fg. 3(a), we fnd that by usng the conventonal method, the total number of objects for each becomes small as ncreases. ISSN: Issue 5, Volume, May

8 Takash Tommoto, Takuj Tachbana, Kenj Sugmoto Number of objects <x4> 6 4 <xd> 5 <xc> xf <x> <xb> x HashID space <xe> <x3> 7 8 <x3e> 4 6 Ths s because the number of nodes becomes small as becomes large. s shown n Fg. 3(b), the average number of objects whch are stored n each node s almost the same regardless of. However, by usng the proposed method, each object can be stored at nodes evenly accordng to regardless of the number of nodes wth each (see Fg. 3(a)). From Fg. 3(b), a node wth larger (smaller) stores a large (small) number of objects. Therefore, n the proposed method, a large number of objects can be stored n a small number of hgh-performance computers and a small number of objects can be stored n a large number of low-performance computers. 4.3 Effect for Load Balancng In ths subsecton, we nvestgate how the proposed method can provde the load balancng among nodes wth the same. We assume that the number of nodes s N 56 and the number of objects s M 5,. We assume that the number of nodes wth s 6 for every, and s equal to /6 for every. Fg. 4 shows the number of objects whch are stored n each node wth. In the horzontal axs of ths fgure, 6 nodes are represented as both nteger number and the frst three-dgts of HashID. It s also shown how 6 nodes are spread n HashID space. From ths fgure, we fnd that the numbers of objects for 6 nodes are much dfferent. Therefore, by usng the proposed method, objects cannot be stored randomly n nodes wth the same. However, from the node dstrbuton n HashID space, we fnd that a large (small) number of objects <x43> <x4f> <x5> <x76> <x76> <x3f> Fg. 4: Total number of objects stored n each node wth. <xb> <xc6> Number of hops 4 3 Case Case Case 3 Case 3 Case Case Number of nodes Fg. 5: verage number of hops vs. number of nodes. are stored n sparsely-dstrbuted (denselydstrbuted) nodes. Ths s because objects are stored n nodes accordng to HashID. Therefore, the proposed method can provde the load balancng f nodes are unformly-dstrbuted n HashID space, for example, when the number of nodes s large. 4.4 Impact of Number of PP Nodes In ths subsecton, we nvestgate the mpact of the number of nodes on the performance of our proposed method. In the followng, the number of nodes s N and the number of objects s gven by M N /. In terms of assgnment for each node, we set / 6 for every. On the other hand, we consder three cases n terms of assgnment for each object. In case, / 6 for every. On the other hand, n case, / 8 when s from to 8 and when s from to 5. Moreover, n case 3,.5,., 3 4.5, 5 4., and 5.. Fg. 5 shows the average number of hops for the proposed method n the three cases. From ths fgure, we fnd that the average number of hops for every case s almost the same. Ths denotes that the average number of hops for the proposed method s not affected by the assgnment for each object. Therefore, the proposed method s effectve even f varous types of nodes have partcpated n a PP network. In addton, we fnd that the average number of hops ncreases as the number of nodes becomes large as expected. Nevertheless, the average number of hops s O (log N) for all the cases. Ths result shows that our proposed method can provde scalablty n terms of the number of nodes. ISSN: Issue 5, Volume, May

9 Takash Tommoto, Takuj Tachbana, Kenj Sugmoto Number of hops Case Case3 Case Case Case Case Number of nodes Fg. 6: verage number of hops vs. number of PP nodes over physcal network. 4.5 Performance over Physcal Networks Fnally, we evaluate the performance of our proposed method over physcal networks. We generate a vrtual physcal network topology based on Barabás-lbert (B) model by usng Boston unversty Representatve Internet Topology generator (BRITE) [6]. The generated network conssts of 5 nodes n a square. In ths network, the number of PP nodes s N, and the nodes are randomly selected among 5 nodes. By usng the proposed method, message routng s performed among N PP nodes based on and HashID. In parallel, over the physcal network, messages are forwarded from a PP node to another PP node va non-pp nodes accordng to Djkstra's algorthm. Fg. 6 shows the average number of hops over the physcal network aganst the number of PP nodes. In ths fgure, the number of objects s gven by M N / for the number of nodes N. ( 5) s assgned to each node wth probablty / 6. On the other hand, n terms of probablty, we consder the same three cases as the subsecton 4.4. From ths fgure, we fnd that the average number of hops s O (log N) for all the cases, as s the case wth the prevous subsecton. Therefore, the capablty-aware object management has scalablty n terms of the number of nodes over physcal networks. 5 Conclusons In ths paper, we proposed the capablty-aware object management based on skp lst, whch s used n large-scale heterogeneous PP networks. In ths method, two dentfcatons are utlzed to consder node's capabltes and provde the load balancng. When objects are stored n and searched from a node, message routng s performed accordng to the two dentfcatons. We evaluated the performance of the proposed method by smulaton. From smulaton results, we found that each object can be stored n nodes by consderng node's capabltes n heterogeneous envronments. In addton, we also found that when the number of nodes s large, the load balancng can be provded easly. The average number of hops for the proposed method s O (log N), and hence the proposed method has scalablty n terms of the number of nodes. From these results, our proposed method s one of the most promsng object management methods n large-scale heterogeneous PP networks. References: [] [] P. Druschel and. Rowstron, PST: Large- Scale, Persstent Peer-to-Peer Storage Utlty, Proc. HotOS VIII, Schoss Elmau, Germany,. [3] [4] S. Yamamoto, Y. Murata, K. Yasumoto, and M. Ito, Dstrbuted Event Delvery Method wth Load Balancng for MMORPG, Proc. 4th CM SIGCOMM Workshop on Network and System Support for Games, 5. [5] I. Stoca, R. Morrs, D. Karger, F. Kaashoek, and H. Balakrshnan, Chord: Scalable Peerto-Peer Lookup Servce for Internet pplcatons, Proc. CM SIGCOMM, ugust. [6]. Rowstron and P. Druschel, Pastry: Scalable, Dstrbuted Object Locaton and Routng for Large-Scale Peer-to-Peer Systems, Proc. Internatonal Conference on Dstrbuted Systems Platforms, November. [7] Z. Xu, M. Mahalngam, and M. Karlsson, Turnng Heterogenety nto an dvantage n Overlay Routng, Proc. IEEE INFOCOM'3, prl 3. [8] J. Hu, M. L, H. Yu, and W. Zheng, Tourst: Self-daptve Structured Overlay n Heterogeneous PP Networks, Techncal Report THTR-CS-HPC-6-, Tsnghua Unverstfy, 6. [] C. Chou, D. We, C. Kuo, and K. Nak, nonymous Peer-to-Peer Communcaton Protocol over Moble d-hoc Networks, Proc. IEEE Globecom 6, November/December 6. ISSN: Issue 5, Volume, May

10 Takash Tommoto, Takuj Tachbana, Kenj Sugmoto [] Y. Zhang, W. Lu, and W. Lou, nonymous Communcatons n Moble d Hoc Networks, Proc. IEEE INFOCOM'5, March 5. [] M. Demrbas and H. Ferhatosmanoglu, Peerto-Peer Spatal Queres n Sensor Networks, Proc. the 3rd Internatonal Conference on Peer-to-Peer Computng, September 3. [] W. Pugh, Skp Lsts: Probablstc lternatve to Balanced Trees, Proc. Workshop on lgorthms and Data Structures, January 3. [3] T. Tommoto, T. Tachbana, and K. Sugmoto, Capablty-ware ID ssgnment and Message Routng based on Skp Lst n Large- Scale Heterogeneous PP Networks, Proc. IEEE Globecom 7, November 7. [4] J. spnes and G. Shah, Skp Graphs, Proc. the 4th CM-SIM Symp. on Dscrete lgorthm (SOD), January 3. [5] N. Harvey, M. Jones, S. Sarou, M. Themer, and. Wolman, SkpNet: Scalable Overlay Network wth Practcal Localty Propertes, Proc. the Fourth USENIX Symposum on Internet Technologes and Systems (USITS'3), March 3. [6] ISSN: Issue 5, Volume, May

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Repeater Insertion for Two-Terminal Nets in Three-Dimensional Integrated Circuits

Repeater Insertion for Two-Terminal Nets in Three-Dimensional Integrated Circuits Repeater Inserton for Two-Termnal Nets n Three-Dmensonal Integrated Crcuts Hu Xu, Vasls F. Pavlds, and Govann De Mchel LSI - EPFL, CH-5, Swtzerland, {hu.xu,vasleos.pavlds,govann.demchel}@epfl.ch Abstract.

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol 2012 Thrd Internatonal Conference on Networkng and Computng Usng Partcle Swarm Optmzaton for Enhancng the Herarchcal Cell Relay Routng Protocol Hung-Y Ch Department of Electrcal Engneerng Natonal Sun Yat-Sen

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

A Traffic Aware Routing Protocol for Congestion Avoidance in Content-Centric Network

A Traffic Aware Routing Protocol for Congestion Avoidance in Content-Centric Network , pp.69-80 http://dx.do.org/10.14257/jmue.2014.9.9.08 A Traffc Aware Routng Protocol for Congeston Avodance n Content-Centrc Network Jung-Jae Km 1, Mn-Woo Ryu 2*, S-Ho Cha 3 and Kuk-Hyun Cho 1 1 Dept.

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Assembler. Building a Modern Computer From First Principles.

Assembler. Building a Modern Computer From First Principles. Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought

More information

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks 12 IEEE Wreless Communcatons and Networkng Conference: Moble and Wreless Networks Onlne Polces for Opportunstc Vrtual MISO Routng n Wreless Ad Hoc Networks Crstano Tapparello, Stefano Tomasn and Mchele

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Connection-information-based connection rerouting for connection-oriented mobile communication networks

Connection-information-based connection rerouting for connection-oriented mobile communication networks Dstrb. Syst. Engng 5 (1998) 47 65. Prnted n the UK PII: S0967-1846(98)90513-7 Connecton-nformaton-based connecton reroutng for connecton-orented moble communcaton networks Mnho Song, Yanghee Cho and Chongsang

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty

More information

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach Dstrbuted Resource Schedulng n Grd Computng Usng Fuzzy Approach Shahram Amn, Mohammad Ahmad Computer Engneerng Department Islamc Azad Unversty branch Mahallat, Iran Islamc Azad Unversty branch khomen,

More information

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors Optmal Fault-Tolerant Routng n Hypercubes Usng Extended Safety Vectors Je Wu Department of Computer Scence and Engneerng Florda Atlantc Unversty Boca Raton, FL 3343 Feng Gao, Zhongcheng L, and Ynghua Mn

More information

Application of VCG in Replica Placement Strategy of Cloud Storage

Application of VCG in Replica Placement Strategy of Cloud Storage Internatonal Journal of Grd and Dstrbuted Computng, pp.27-40 http://dx.do.org/10.14257/jgdc.2016.9.4.03 Applcaton of VCG n Replca Placement Strategy of Cloud Storage Wang Hongxa Computer Department, Bejng

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Wireless Sensor Network Localization Research

Wireless Sensor Network Localization Research Sensors & Transducers 014 by IFSA Publshng, S L http://wwwsensorsportalcom Wreless Sensor Network Localzaton Research Lang Xn School of Informaton Scence and Engneerng, Hunan Internatonal Economcs Unversty,

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Synchronous Distributed Wireless Network Emulator for High-Speed Mobility: Implementation and Evaluation

Synchronous Distributed Wireless Network Emulator for High-Speed Mobility: Implementation and Evaluation Synchronous Dstrbuted Wreless Network Emulator for Hgh-Speed Moblty: Implementaton and Evaluaton Mnoru Kozum, Tomoch Ebata Yokohama Research Laboratory, Htach, Ltd., 292 Yoshda-cho, Totsuka-ku, Yokohama,

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

A Frame Packing Mechanism Using PDO Communication Service within CANopen

A Frame Packing Mechanism Using PDO Communication Service within CANopen 28 A Frame Packng Mechansm Usng PDO Communcaton Servce wthn CANopen Mnkoo Kang and Kejn Park Dvson of Industral & Informaton Systems Engneerng, Ajou Unversty, Suwon, Gyeongg-do, South Korea Summary The

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Comparison of Heuristics for Scheduling Independent Tasks on Heterogeneous Distributed Environments

Comparison of Heuristics for Scheduling Independent Tasks on Heterogeneous Distributed Environments Comparson of Heurstcs for Schedulng Independent Tasks on Heterogeneous Dstrbuted Envronments Hesam Izakan¹, Ath Abraham², Senor Member, IEEE, Václav Snášel³ ¹ Islamc Azad Unversty, Ramsar Branch, Ramsar,

More information

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks Moblty Based Routng Protocol wth MAC Collson Improvement n Vehcular Ad Hoc Networks Zhhao Dng, Pny Ren, Qnghe Du Shaanx Smart Networks and Ubqutous Access Rearch Center School of Electronc and Informaton

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087

More information

Cell Count Method on a Network with SANET

Cell Count Method on a Network with SANET CSIS Dscusson Paper No.59 Cell Count Method on a Network wth SANET Atsuyuk Okabe* and Shno Shode** Center for Spatal Informaton Scence, Unversty of Tokyo 7-3-1, Hongo, Bunkyo-ku, Tokyo 113-8656, Japan

More information

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the ICC 008 proceedngs. Dynamc Bandwdth Provsonng wth Farness and Revenue Consderatons

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Research Article Information Transmission Probability and Cache Management Method in Opportunistic Networks

Research Article Information Transmission Probability and Cache Management Method in Opportunistic Networks Wreless Communcatons and Moble Computng Volume 2018, Artcle ID 1571974, 9 pages https://do.org/10.1155/2018/1571974 Research Artcle Informaton Transmsson Probablty and Cache Management Method n Opportunstc

More information

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your

More information

On Maximizing the Lifetime of Delay-Sensitive Wireless Sensor Networks with Anycast

On Maximizing the Lifetime of Delay-Sensitive Wireless Sensor Networks with Anycast On Maxmzng the Lfetme of Delay-Senstve Wreless Sensor Networks wth Anycast Joohwan Km, Xaojun Ln, Ness B. Shroff, and Prasun Snha School of Electrcal and Computer Engneerng, Purdue Unversty Departments

More information

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,

More information

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks A Load-balancng and Energy-aware Clusterng Algorthm n Wreless Ad-hoc Networks Wang Jn, Shu Le, Jnsung Cho, Young-Koo Lee, Sungyoung Lee, Yonl Zhong Department of Computer Engneerng Kyung Hee Unversty,

More information

Two-Stage Data Distribution for Distributed Surveillance Video Processing with Hybrid Storage Architecture

Two-Stage Data Distribution for Distributed Surveillance Video Processing with Hybrid Storage Architecture Two-Stage Data Dstrbuton for Dstrbuted Survellance Vdeo Processng wth Hybrd Storage Archtecture Yangyang Gao, Hatao Zhang, Bngchang Tang, Yanpe Zhu, Huadong Ma Bejng Key Lab of Intellgent Telecomm. Software

More information

FEAR: Fuzzy-Based Energy Aware Routing Protocol for Wireless Sensor Networks

FEAR: Fuzzy-Based Energy Aware Routing Protocol for Wireless Sensor Networks Int l J. of Communcatons, etwork and System Scences, 2011, 4, 403-415 do:10.4236/jcns.2011.46048 Publshed Onlne June 2011 (http://www.scrp.org/journal/jcns) FEAR: Fuzzy-Based Energy Aware Routng Protocol

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

An efficient iterative source routing algorithm

An efficient iterative source routing algorithm An effcent teratve source routng algorthm Gang Cheng Ye Tan Nrwan Ansar Advanced Networng Lab Department of Electrcal Computer Engneerng New Jersey Insttute of Technology Newar NJ 7 {gc yt Ansar}@ntedu

More information

Future Generation Computer Systems

Future Generation Computer Systems Future Generaton Computer Systems 29 (2013) 1631 1644 Contents lsts avalable at ScVerse ScenceDrect Future Generaton Computer Systems journal homepage: www.elsever.com/locate/fgcs Gosspng for resource

More information

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks 1 Chen-Mn Wu, 2 Hu-Ka Su, 3 Wang-Has Yang *1,Correspondng Author Nanhua Unversty, cmwu@mal.nhu.edu.tw 2 Natonal Formosa Unversty, hksu@nfu.edu.tw 3 Hsupng Insttute of Technology, yangwh@mal.ht.edu.tw do:10.4156/jact.vol3.

More information

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

11. HARMS How To: CSV Import

11. HARMS How To: CSV Import and Rsk System 11. How To: CSV Import Preparng the spreadsheet for CSV Import Refer to the spreadsheet template to ad algnng spreadsheet columns wth Data Felds. The spreadsheet s shown n the Appendx, an

More information

CS 534: Computer Vision Model Fitting

CS 534: Computer Vision Model Fitting CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.

More information

A MapReduce-supported Data Center Networking Topology

A MapReduce-supported Data Center Networking Topology A MapReduce-supported Data Center Networkng Topology Zelu Dng*,, Xue Lu, Deke Guo*, Honghu Chen*, Xueshan Luo* * Natonal Unversty of Defense Technology, Chna McGll Unversty, Canada Abstract Several novel

More information

Comparisons of Packet Scheduling Algorithms for Fair Service among Connections on the Internet

Comparisons of Packet Scheduling Algorithms for Fair Service among Connections on the Internet Comparsons of Packet Schedulng Algorthms for Far Servce among Connectons on the Internet Go Hasegawa, Takahro Matsuo, Masayuk Murata and Hdeo Myahara Department of Infomatcs and Mathematcal Scence Graduate

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Real-time Motion Capture System Using One Video Camera Based on Color and Edge Distribution

Real-time Motion Capture System Using One Video Camera Based on Color and Edge Distribution Real-tme Moton Capture System Usng One Vdeo Camera Based on Color and Edge Dstrbuton YOSHIAKI AKAZAWA, YOSHIHIRO OKADA, AND KOICHI NIIJIMA Graduate School of Informaton Scence and Electrcal Engneerng,

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

AN INDEXING METHOD FOR SUPPORTING SPATIAL QUERIES IN STRUCTURED PEER-TO-PEER SYSTEMS

AN INDEXING METHOD FOR SUPPORTING SPATIAL QUERIES IN STRUCTURED PEER-TO-PEER SYSTEMS AN INDEXING METHOD FOR SUPPORTING SPATIAL QUERIES IN STRUCTURED PEER-TO-PEER SYSTEMS Lngku Meng a, Wenun Xe a, *, Dan Lu a, b a School of Remote Sensng and Informaton Engneerng, Wuhan Unversty, Wuhan 4379,

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

CHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vidyanagar

CHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vidyanagar CHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vdyanagar Faculty Name: Am D. Trved Class: SYBCA Subject: US03CBCA03 (Advanced Data & Fle Structure) *UNIT 1 (ARRAYS AND TREES) **INTRODUCTION TO ARRAYS If we want

More information

Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain

Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain Resource-Effcent Mult-Source Authentcaton Utlzng Splt-Jon One-Way ey Chan Seonho Cho, un Sun, Hyeonsang Eom 3 Department of Computer Scence, Bowe State Unversty, Bowe, Maryland, U.S.A. Center for Secure

More information

A Novel Distributed Collaborative Filtering Algorithm and Its Implementation on P2P Overlay Network*

A Novel Distributed Collaborative Filtering Algorithm and Its Implementation on P2P Overlay Network* A Novel Dstrbuted Collaboratve Flterng Algorthm and Its Implementaton on P2P Overlay Network* Peng Han, Bo Xe, Fan Yang, Jajun Wang, and Rumn Shen Department of Computer Scence and Engneerng, Shangha Jao

More information

Long Lifetime Routing in Unreliable Wireless Sensor Networks

Long Lifetime Routing in Unreliable Wireless Sensor Networks 211 Internatonal Conference on Networkng, Sensng and Control Delft, the Netherlands, 11-13 Aprl 211 Long Lfetme Routng n Unrelable Wreless Sensor Networks Hamed Yousef, Mohammad Hossen Yeganeh, Al Movaghar

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

On Fault-Tolerant Embedding of Meshes and Tori in a Flexible Hypercube with Unbounded Expansion

On Fault-Tolerant Embedding of Meshes and Tori in a Flexible Hypercube with Unbounded Expansion On Fault-Tolerant Embeddng of Meshes and Tor n a Flexble Hypercube wth Unbounded Expanson *JEN-CHIH LIN Department of Dgtal Technology Desgn, Natonal Tape Unversty of Educaton, No.34, Sec. 2, Hepng E.

More information

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks Ad Hoc Networks 11 (213) 1136 1149 Contents lsts avalable at ScVerse ScenceDrect Ad Hoc Networks journal homepage: www.elsever.com/locate/adhoc Generc predcton asssted sngle-copy routng n underwater delay

More information

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture Goals and Approach CS 194: Dstrbuted Systems Resource Allocaton Goal: acheve predcable performances Three steps: 1) Estmate applcaton s resource needs (not n ths lecture) 2) Admsson control 3) Resource

More information

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION 24 CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION The present chapter proposes an IPSO approach for multprocessor task schedulng problem wth two classfcatons, namely, statc ndependent tasks and

More information

Optimization of Local Routing for Connected Nodes with Single Output Ports - Part I: Theory

Optimization of Local Routing for Connected Nodes with Single Output Ports - Part I: Theory U J.T. (: 33- (pr. 0 Optmzaton of Local Routng for Connected odes wth Sngle Output Ports - Part I: Theory Dobr tanassov Batovsk Faculty of Scence and Technology ssumpton Unversty Bangkok Thaland E-mal:

More information

Intro. Iterators. 1. Access

Intro. Iterators. 1. Access Intro Ths mornng I d lke to talk a lttle bt about s and s. We wll start out wth smlartes and dfferences, then we wll see how to draw them n envronment dagrams, and we wll fnsh wth some examples. Happy

More information

A Novel Fuzzy Stochastic Routing Protocol For Mobile AdHoc Network

A Novel Fuzzy Stochastic Routing Protocol For Mobile AdHoc Network Avalable Onlne at www.jcsmc.com Internatonal Journal of Computer Scence and Moble Computng A Monthly Journal of Computer Scence and Informaton Technology IJCSMC, Vol. 2, Issue. 0, October 203, pg.98 06

More information

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Minimum Cost Optimization of Multicast Wireless Networks with Network Coding

Minimum Cost Optimization of Multicast Wireless Networks with Network Coding Mnmum Cost Optmzaton of Multcast Wreless Networks wth Network Codng Chengyu Xong and Xaohua L Department of ECE, State Unversty of New York at Bnghamton, Bnghamton, NY 13902 Emal: {cxong1, xl}@bnghamton.edu

More information