An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique
|
|
- Arleen Tate
- 5 years ago
- Views:
Transcription
1 International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech (CSE), MVR College of Engineering an Technology, A.P., Inia. 2 Asst. Professor, Dept. of Computer Science & Engineering, MVR College of Engineering an Technology, A.P., Inia. Abstract: The basic iea of backpressure techniques is to prioritize transmissions over links that have the highest queue ifferentials. Backpressure metho effectively makes packets flow through the network as though pulle by gravity towars the estination en, which has the smallest queue size of zero. Uner high traffic conitions, this metho works very well, an backpressure is able to fully utilize the available network resources in a highly ynamic fashion. Uner low traffic conitions, however, because many other hosts may also have a small or zero queue size, there is inefficiency in terms of an increase in elay, as packets may loop or take a long time to make their way to the estination en. In this paper we use the concept of shaow queues. Each noe has to maintain some counters, calle as shaow queues, per estination. This is very similar to the iea of maintaining a routing table (for routing purpose) per estination. Using the concept of shaow queues, we partially ecouple routing an the scheuling. A shaow network is maintaine to upate a probabilistic routing table that packets use upon arrival at a noe. The same shaow network, with back-pressure technique, is use to activate transmissions between noes. The routing algorithm is esigne to minimize the average number of hops use by the packets in the network. This iea, along with the scheuling an routing ecoupling, leas to elay reuction compare with the traitional back-pressure algorithm. Keywors: Back pressure, Packets, Routing, Shaow queue. I. INTRODUCTION The back pressure metho first propose in [1] has recently shown a great potential for solving a number of issues in the wireless multi-hop networks. The central iea of back-pressure scheuling moel is that contention among the links shoul be resolve by scheuling the link which has the largest prouct of the queue ifferential backlog between its enpoints an the transmission rate at which the link can be serve. In a perfectly time-slotte meium access mechanism such as TDMA (Time Division Multiple Access), this will result into optimal throughput of flows while guaranteeing the queue stability (ingress traffic to a queue never excees its egress traffic). The utility maximization framework initially propose in [2] shows that iection rates of the flows shoul be chosen such that aggregate utility of the flows is to be maximize. Here the utility of flow represents a esirable effect on the entire network achieve by a particular rate of the flow. It was shown in [3] [4] that the backpressure scheuling an utility base rate control together can solve the global problem of the network utility maximization. The funamental challenge with back pressure metho is that solution of the unerlying scheuling strategy is NP-har [5]. Also, since it was propose for a centralize, time slotte, an synchronize system, a istribute implementation which can achieve even a closer approximation is very ifficult to evelop. Recently, [6] have attempte to incorporate backpressure technique base scheuling in ranom meium access protocols such as CSMA/CA. These protocols try to approximate the performance of the ieal back pressure scheuler by prioritizing the frame transmissions accoring to ifferential backlogs of the queues. Here, every noe in the network maintains a per estination queue (PDQ) an the packets estine to a particular estination host are store in the PDQ of that estination host until further forwaring ecisions are mae. Now, noes share their PDQ information with their neighboring noes, an this information is utilize by every noe to calculate the ifferential backlogs of its PDQs. The ifferential backlog of a PDQ at a noe is equal to the size of the PDQ minus the size of the PDQ of its upstream neighbor towars the estination en. To emulate the back pressure scheuling, the packets of the PDQ which has the highest ifferential backlog (highest back-pressure) in the neighborhoo are given the higher chances for the transmission. This way, the likelihoo that the packets are transmitte from a particular PDQ at a noe is proportional to its ifferential IJMER ISSN: Vol. 4 Iss.9 Sept
2 backlog compare to the ifferential backlogs of PDQs of all noes in the neighborhoo. This prioritization quickly moves the traffic from long back logge queues to the shorter queues achieving an improve throughput an a better overall stability of queues. II. RELATED WORK The first theoretical work on backpressure scheuling technique is the classic result in [1], proving that this queue-ifferential base scheuling metho is throughput optimal (i.e., it can stabilize any feasible rate vector in a network). Since then, researchers have combine the basic backpressure technique with utility optimization to provie a comprehensive approach to the stochastic network optimization [7], [8]. In [9], the authors present a metho whereby only one real queue is maintaine for each neighbor noe, along with virtual counters an shaow queues for all estinations, an show that this yiels elay improvements. In [10], a novel variant of the backpressure scheuling technique is propose which uses hea of line packet elay instea of the queue lengths as the basis of the backpressure weight calculation for each link or commoity, also yieling enhance elay performance. However, these works both assume the existence of the static fixe routes. In [11] an [12], the authors present two works on backpressure routing aime specifically for clusterbase intermittently connecte networks. In [11], the authors evelop a two phase routing metho, combining the backpressure routing with source routing for the cluster-base networks, separating intra cluster routing from inter-cluster routing. They show that this scheme results in large queues at only a subset of the noes, yieling smaller elays than conventional backpressure technique. In [12], the authors implement the abovementione algorithm in a real experimental network an show that the elay improvements empirically. The key ifference of these works from our propose work is that we o not make any assumption about the intermittently connecte network being organize in a cluster base hierarchy an we require no previous knowlege of noes mobility. III. PROPOSED WORK 1. Throughput Optimal Backpressure Algorithm This algorithm works on wireless networks. This back pressure algorithm shoul be epening on one main proceure. The main proceure is the estination queue proceure by using these proceure only we can reucing the poor elay of the time an the istance every noe at the time of routing file in between the two or more locations preestination queues maintaining the two phases: routing algorithm scheuling algorithm. In this system says istance is very high an time is very high. So may raw backs will be occurre at the time of working on the routing algorithm that s why we are implementing a new algorithm. Scheuling algorithm combine with the routing algorithm. Our scheuling algorithm says what to proviing the scheule for prepress of the over come to raw backs that s why we are using the roun robin algorithm an shortest path routing algorithm. In this algorithm proviing quality of services to the en users epening on the service only routing will be ecie it is best routing or the ba routing. QOS may be epens 4 phases: Banwith, frequency, time, istance. In any network epens on QOS. Banwith an frequency is very high an time istance is low QOS is very high. At each link the algorithm assigns a weight to each possible estination noe that is calle back pressure. Define the back pressure at link (n,j) for estination noe at slot t to be: where Qn(t) enotes the number of packets at noe n enote for noe at the beginning of time-slot t. Uner this notation, Qnn (t) =0, t. Assign a weight w to each link (n, j), where w is efine to be the maximum back pressure overall possible estinations. i.e. IJMER ISSN: Vol. 4 Iss.9 Sept
3 2. Min Resource Routing The back-pressure algorithm explores all paths in the entire network an, as a result, may choose paths that are unnecessarily long, which may even contain some loops, thus leaing to poor performance. We aress this problem by introucing a cost function that measures the total amount of the resources use by all flows in the network. Specially, we a up the traffic loas on all links in the network an use this as our cost function. The goal then is to minimize this cost subject to the network capacity constraints. Given a set of packet arrival rates that lie within the capacity area, our goal is to fin the routes for the flows so that we use as few resources as possible in the network. Thus, we formulate the following optimization problem: min s. t. f F x N, n N { }( n, j) L ( ) L f I{ b( f ) n, e( f ) } (ln) L ln ( ) L Figure 1 illustrates how the M back pressure algorithm works in a simple wireline network. All links in the network can be activate simultaneously without interfering with each other. Note that the backlog ifference of route 1 is 6 an the backlog ifference of the route 2 is 4. Because the backlog ifference of the route 2 is smaller than M, the route 2 is blocke at current traffic loa. The M -back-pressure algorithm will automatically choose the route 1, which is shorter. Therefore, a proper M can avoi the long routes in when the traffic is not close to capacity. Fig. 1: Link weights uner the M -back-pressure algorithm. 3. Shaow Queue Algorithm In aitional to the real queues, each noe n also maintains a counter, which is known as shaow queue, pn for each estination. Unlike the real queues, the counters are much easier to maintain even if the number of counters at each noe grows linearly with the size of the overall network. The shaow queues are upate base on the movement of the fictitious entities calle as shaow packets in the network. The movement of the fictitious packets can be thought of as an exchange of the control messages for the purposes of the routing an scheule. Just like the real packets, shaow packets arrive from outsie the network an eventually exit the network. The back-pressure for estination on link (n j)is taken to be as follows: w [ p [ p [ M n j The evolution of the shaow queue p n [ is p n [ t 1] p { ln[ } l:(ln) L n [ ln[ I{ b( f ) n, e( f ) } f F I{ [ } u[ j:( ) L I u a [ f IJMER ISSN: Vol. 4 Iss.9 Sept
4 Where u [ is the number of shaow packets transmitte over the link (n j) in time t. [ is the estination noe that has the max weight on the link (n j). a f [ is the number of shaow packets generate in time t for flow f. 4. Aaptive Routing Algorithm When a packet arrive at a noe, then it use route as follows: Let [ is the number of shaow packets from noe n to the noe j for estination uring time t. Let enote an estimate of the expecte value of [ at time t. At each time slot t, the following sequence of operations occurs at each noe. A packet arriving at noe n for estination is inserte in the real queue P [ [ k:( nk) L nk[ q for next-hop neighbor j with probability: Packets waiting at link (n j) are transmitte over the link when that link is scheule as shown in figure 2. Fig. 2: Probabilistic splitting algorithm at noe IV. CONCLUSION ackpressure scheuling an routing, in which packets are preferentially transmitte over communication links with high queue ifferentials, offers the promise of throughput-optimal operation for a wie range of the communication networks. However, when the traffic loa is very low, ue to the corresponing low queue occupancy, then the backpressure scheuling/routing experiences long elays. This is particularly of concern in the intermittent encounter-base mobile networks which are alreay elay-limite ue to the sparse an highly ynamic network connectivity. While state of the art mechanisms for such networks have propose the use of the reunant transmissions to improve the elay, they o not work well when the traffic loa is high. We ecouple (to a certain egree) routing an scheuling in the network through the use of the probabilistic routing tables an the so-calle shaow queues. We use the same number of shaow queues as the back-pressure technique, but the number of real queues is very small (per neighbor). The new iea here is to perform the routing via probabilistic splitting, which allows the ramatic reuction in the number of the real queues. Finally, an important observation in this work is that the partial ecoupling of the shaow back-pressure an real packet transmission allows us to activate more links than a regular backpressure metho woul. This iea appears to be essential to reuce the elays in the routing case. IJMER ISSN: Vol. 4 Iss.9 Sept
5 REFERENCES [1] L. Tassiulas an A. Ephremies, Stability properties of constraine queueing systems an scheuling policies for maximum throughput in multihop raio networks, ec 1990, pp vol.4. [2] F. Kelly, A. Maulloo, an D. Tan, Rate control in communication networks: shaow prices, proportional fairness an stability, in Journal of the Operational Research Society, vol. 49, [3] L. Chen, S. H. Low, M. Chiang, an J. C. Doyle, Cross-layer congestion control, routing an scheuling esign in a hoc wireless networks, in INFOCOM th IEEE International Conference on Computer Communications. Proceeings, 2006, pp [4] A. Eryilmaz an R. Srikant, Joint congestion control, routing, an mac for stability an fairness in wireless networks, Selecte Areas in Communications, IEEE Journal on, vol. 24, no. 8, pp , [5] M. J. N. Georgiais Leonias an L. Tassiulas, Resource allocation an cross-layer control in wireless networks, in Founations an Trens in Networking, [6] U. Akyol, M. Anrews, P. Gupta, J. Hobby, I. Saniee, an A. Stolyar, Joint scheuling an congestion control in mobile a-hoc networks, april 2008, pp [7] X. Lin, N. Shroff, an R. Srikant, A tutorial on cross-layer optimization in wireless networks, IEEE Journal on Selecte Areas in Communications, vol. 24, no. 8, [8] M. J. Neely, Stochastic network optimization with application to communication an queueing systems, Synthesis Lectures on Communication Networks, vol. 3, no. 1, [9] L. Bui, R. Srikant, an A. Stolyar, Novel architectures an algorithms for elay reuction in back-pressure scheuling an routing, IEEE INFOCOM [10] B. Ji, C. Joo, an N. Shroff, Delay-base back-pressure scheuling in multi-hop wireless networks, IEEE INFOCOM, [11] J. Ryu, L. Ying, an S. Shakkottai, Back-pressure routing for intermittently connecte networks, IEEE INFOCOM [12] J. Ryu, V. Bhargava, N. Paine, an S. Shakkottai, Back-pressure routing an rate control for icns, ACM Mobicom, IJMER ISSN: Vol. 4 Iss.9 Sept
Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks
1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stolyar Abstract Backpressure-base aaptive routing
More informationBackpressure-based Packet-by-Packet Adaptive Routing in Communication Networks
1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stoylar arxiv:15.4984v1 [cs.ni] 27 May 21 Abstract
More informationAlmost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control
Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract
More informationQueueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks
Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication
More informationImproving Spatial Reuse of IEEE Based Ad Hoc Networks
mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos
More informationThroughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem
Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple
More informationAdaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots
Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:
More informationPacket Aggregation based Back-pressure Scheduling in Multi-hop Wireless Networks
Packet Aggregation based Back-pressure Scheduling in Multi-hop Wireless Networks Gaurish Deuskar, Parth H. Pathak, Rudra Dutta Department of Computer Science, North Carolina State University, Raleigh,
More informationMessage Transport With The User Datagram Protocol
Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html
More informationAnyTraffic Labeled Routing
AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,
More informationRobust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks
Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,
More informationDisjoint Multipath Routing in Dual Homing Networks using Colored Trees
Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,
More informationSocially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach
Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly
More informationOn the Placement of Internet Taps in Wireless Neighborhood Networks
1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science
More informationParticle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base
More informationEDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks
sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun
More informationLecture 1 September 4, 2013
CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the
More informationOffloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization
1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24
More informationAn Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach
An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach Nishi Sharma, Vanna Verma Abstract Wireless sensor networks (WSNs) is one of the emerging fiel of research in recent era
More informationADAPTIVE ROUTING IN COMMUNICATION NETWORKS USING CELL BREATHING BASED BACKPRESSURE ALGORITHM
Indian Journal of Communications Technology and Electronics (IJCTE) Vol.2.No.1 2014pp 13-17. available at: www.goniv.com Paper Received :05-03-2014 Paper Published:28-03-2014 Paper Reviewed by: 1. John
More informationLab work #8. Congestion control
TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño
More informationProbabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients
Probabilistic Meium Access Control for 1 Full-Duplex Networks with Half-Duplex Clients arxiv:1608.08729v1 [cs.ni] 31 Aug 2016 Shih-Ying Chen, Ting-Feng Huang, Kate Ching-Ju Lin, Member, IEEE, Y.-W. Peter
More informationA Survey on Congestion Control and Maximization of Throughput in Wireless Networks
A Survey on Congestion Control and Maximization of Throughput in Wireless Networks K.Ravindra Babu Post graduate student V.R.Siddhartha Engineering College ravindra.bec2008@gmail.com J.Ranga Rao Assistant
More informationTransient analysis of wave propagation in 3D soil by using the scaled boundary finite element method
Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite
More informationA Distributed CSMA Algorithm for Maximizing Throughput in Wireless Networks
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 2, Number 2 (2012), pp. 125-132 International Research Publications House http://www. ripublication.com A Distributed
More informationIEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,
More informationSupporting Fully Adaptive Routing in InfiniBand Networks
XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar
More informationMORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks
: a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications
More informationResearch Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks
Hinawi Publishing Corporation International Journal of Distribute Sensor Networks Volume 2014, Article ID 936379, 17 pages http://x.oi.org/10.1155/2014/936379 Research Article REALFLOW: Reliable Real-Time
More informationAd-Hoc Networks Beyond Unit Disk Graphs
A-Hoc Networks Beyon Unit Disk Graphs Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich 8092 Zurich, Switzerlan {kuhn, wattenhofer, zollinger}@inf.ethz.ch ABSTRACT
More informationQuestions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!
EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an
More informationA CLASSIFICATION FRAMEWORK FOR SCHEDULING ALGORITHMS IN WIRELESS MESH NETWORKS Lav Upadhyay 1, Himanshu Nagar 2, Dharmveer Singh Rajpoot 3
A CLASSIFICATION FRAMEWORK FOR SCHEDULING ALGORITHMS IN WIRELESS MESH NETWORKS Lav Upadhyay 1, Himanshu Nagar 2, Dharmveer Singh Rajpoot 3 1,2,3 Department of Computer Science Engineering Jaypee Institute
More informationImpact of FTP Application file size and TCP Variants on MANET Protocols Performance
International Journal of Moern Communication Technologies & Research (IJMCTR) Impact of FTP Application file size an TCP Variants on MANET Protocols Performance Abelmuti Ahme Abbasher Ali, Dr.Amin Babkir
More informationOptimizing Scheduling Policies and Analyzing Delay in Multi-Hop Wireless Networks P.Pavan kumar Reddy 1, Manohar Gosul 2
Optimizing Scheduling Policies and Analyzing Delay in Multi-Hop Wireless Networks P.Pavan kumar Reddy 1, Manohar Gosul 2 1 M.Tech in CSE Dept, 2 Associate Professor Abstract: In this paper a multi-hop
More informationOn Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation
On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member
More informationOptimal Routing and Scheduling for Deterministic Delay Tolerant Networks
Optimal Routing an Scheuling for Deterministic Delay Tolerant Networks Davi Hay Dipartimento i Elettronica olitecnico i Torino, Italy Email: hay@tlc.polito.it aolo Giaccone Dipartimento i Elettronica olitecnico
More informationMOBILE data is continuing to grow exponentially, and
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 25, NO. 3, JUNE 2017 1431 Enhancing Mobile Networks With Software Define Networking an Clou Computing Zizhong Cao, Stuent Member, IEEE, Shivenra S. Panwar, Fellow,
More informationContent Caching and Scheduling For Clusters with Elastic and Inelastic Traffic
International Journal of Research Studies in Science, Engineering and Technology Volume 3, Issue 1, January 2016, PP 1-5 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) Content Caching and Scheduling
More informationThreshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides
Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita
More informationScalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter
FDL sel. VOA SOA 100 Regular papers ONDM 2018 Scalable Deterministic Scheuling for WDM Slot Switching Xhaul with Zero-Jitter Bogan Uscumlic 1, Dominique Chiaroni 1, Brice Leclerc 1, Thierry Zami 2, Annie
More informationStudy of Network Optimization Method Based on ACL
Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department
More informationStatic Round-Robin Dispatching Schemes for Clos-Network Switches'
Static RounRobin Dispatching Schemes for ClosNetwork Switches' Konghong Pun Mounir Hami Department of Computer Science Hong Kong University of Science an Technology Clear Water Bay, Kowloon, Hong Kong
More informationFast Fractal Image Compression using PSO Based Optimization Techniques
Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting
More informationCONGESTION CONTROL BASED ON SLIDING MODE CONTROL AND SCHEDULING WITH PRIORITIZED QUEUING FOR WIRELESS NETWORKS
CONGESTION CONTROL BASED ON SLIDING MODE CONTROL AND SCHEDULING WITH PRIORITIZED QUEUING FOR WIRELESS NETWORKS R.Keerthana 1, S.Lavanya 2 1 PG Scholar, Dept. of CSE, Sona College of Technology, Salem 636005,
More informationNon-Uniform Sensor Deployment in Mobile Wireless Sensor Networks
01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University
More informationDistributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs
IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,
More informationArchitecture Design of Mobile Access Coordinated Wireless Sensor Networks
Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,
More informationProvisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks
Provisioning Virtualize Clou Services in IP/MPLS-over-EON Networks Pan Yi an Byrav Ramamurthy Department of Computer Science an Engineering, University of Nebraska-Lincoln Lincoln, Nebraska 68588 USA Email:
More informationScheduling in Multihop Wireless Networks without Back-pressure
Forty-Eighth Annual Allerton Conerence Allerton House, UIUC, Illinois, USA September 29 - October 1, 2010 Scheduling in Multihop Wireless Networks without Back-pressure Shihuan Liu, Eylem Ekici, and Lei
More informationYet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien
Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,
More informationA SWARM INSPIRED MULTIPATH DATA TRANSMISSION WITH CONGESTION CONTROL IN MANETS USING PROBABILISTIC APPROACH
A SWARM INSPIRED MULTIPATH DATA TRANSMISSION WITH CONGESTION CONTROL IN MANETS USING PROBABILISTIC APPROACH Subhankar oarar 1, Vanana Bhattacheree 2 an Debasis Giri 1 1 Department of Computer Science an
More informationTHE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM
International Journal of Physics an Mathematical Sciences ISSN: 2277-2111 (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao
More informationComparison of Methods for Increasing the Performance of a DUA Computation
Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,
More informationDual Arm Robot Research Report
Dual Arm Robot Research Report Analytical Inverse Kinematics Solution for Moularize Dual-Arm Robot With offset at shouler an wrist Motivation an Abstract Generally, an inustrial manipulator such as PUMA
More informationOverview : Computer Networking. IEEE MAC Protocol: CSMA/CA Internet mobility TCP over noisy links
Overview 15-441 15-441: Computer Networking 15-641 Lecture 24: Wireless Eric Anerson Fall 2014 www.cs.cmu.eu/~prs/15-441-f14 Internet mobility TCP over noisy links Link layer challenges an WiFi Cellular
More informationOnline Appendix to: Generalizing Database Forensics
Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that
More informationPAPER. 1. Introduction
IEICE TRANS. COMMUN., VOL. E9x-B, No.8 AUGUST 2010 PAPER Integrating Overlay Protocols for Proviing Autonomic Services in Mobile A-hoc Networks Panagiotis Gouvas, IEICE Stuent member, Anastasios Zafeiropoulos,,
More informationA Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition
ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural
More informationCongestion Control using Cross layer and Stochastic Approach in Distributed Networks
Congestion Control using Cross layer an Stochastic Approach in Distribute Networks Selvarani R Department of Computer science an Engineering Alliance College of Engineering an Design Bangalore, Inia Vinoha
More informationSkyline Community Search in Multi-valued Networks
Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h
More informationCross-Layer Optimization for Wireless Networks with Multi-Receiver Diversity
Cross-Layer Optimization for Wireless Networks with Multi-Receiver Diversity 1 2 3 error broadcasting Michael J. Neely University of Southern California http://www-rcf.usc.edu/~mjneely/ Comm Theory Workshop,
More informationSolution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation
Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University
More informationJust-In-Time Software Pipelining
Just-In-Time Software Pipelining Hongbo Rong Hyunchul Park Youfeng Wu Cheng Wang Programming Systems Lab Intel Labs, Santa Clara What is software pipelining? A loop optimization exposing instruction-level
More informationSURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH
SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway
More informationCoupling the User Interfaces of a Multiuser Program
Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces
More informationDivide-and-Conquer Algorithms
Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:
More informationCS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing
CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which
More informationClassifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means
Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu
More informationImage Segmentation using K-means clustering and Thresholding
Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,
More informationAdjusted Probabilistic Packet Marking for IP Traceback
Ajuste Probabilistic Packet Marking for IP Traceback Tao Peng, Christopher Leckie, an Kotagiri Ramamohanarao 2 ARC Special Research Center for Ultra-Broaban Information Networks Department of Electrical
More informationPerformance Modelling of Necklace Hypercubes
erformance Moelling of ecklace ypercubes. Meraji,,. arbazi-aza,, A. atooghy, IM chool of Computer cience & harif University of Technology, Tehran, Iran {meraji, patooghy}@ce.sharif.eu, aza@ipm.ir a Abstract
More informationThe Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract
The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie
More informationBlocking Avoidance in Wireless Networks
Blocking Avoidance in Wireless Networks Shanyu Zhou University of Illinois at Chicago szhou45@uic.edu Hulya Seferoglu University of Illinois at Chicago hulya@uic.edu Erdem Koyuncu University of California,
More informationDiscrete Markov Image Modeling and Inference on the Quadtree
390 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 9, NO. 3, MARCH 2000 Discrete Markov Image Moeling an Inference on the Quatree Jean-Marc Laferté, Patrick Pérez, an Fabrice Heitz Abstract Noncasual Markov
More informationOptimal Link Capacity Dimensioning in Proportionally Fair Networks
Optimal Link Capacity Dimensioning in Proportionally Fair Networks Micha l Pióro 1,Gábor Malicskó 2, an Gábor Foor 3 1 Department of Communication Systems, Lun Institute of Technology, Sween, Michal.Pioro@telecom.lth.se
More informationOptimal Oblivious Path Selection on the Mesh
Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract
More informationBends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways
Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis
More informationOn the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems
On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,
More informationQuestions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!
EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an
More informationCascading Multi-Hop Reservation and Transmission in Underwater Acoustic Sensor Networks
Sensors 2014, 14, 18390-18409; oi:10.3390/s141018390 Article OPEN ACCESS sensors ISSN 1424-8220 www.mpi.com/journal/sensors Cascaing Multi-Hop Reservation an Transmission in Unerwater Acoustic Sensor Networks
More informationOptimal Distributed P2P Streaming under Node Degree Bounds
Optimal Distribute P2P Streaming uner Noe Degree Bouns Shaoquan Zhang, Ziyu Shao, Minghua Chen, an Libin Jiang Department of Information Engineering, The Chinese University of Hong Kong Department of EECS,
More informationMinimization of Congestion using Backpressure Routing Algorithm in Wireless Networks
Vol. 3, Issue. 3, May.-June. 2013 pp-1681-1689 ISSN: 2249-6645 Minimization of Congestion using Backpressure Routing Algorithm in Wireless Networks A. Priyadharsini, Mr. S. Mohanarangan, Dr. D. Sivakumar
More informationEFFICIENT MULTICAST DATA REPLICATION APPROACH FOR POWER CONSUMPTION IN MANET
EFFICIENT MULTICAST DATA REPLICATION APPROACH FOR POWER CONSUMPTION IN MANET 1 T.KARTHIKEYAN, 2 DR.A.RAJARAM 2 Research Scholar, Karpagam University, Coimbatore, Inia 1 Associate Professor, Department
More informationAn Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources
An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract
More informationOn the Feasibility and Efficacy of Protection Routing in IP Networks
University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering 2-0-2009 On the Feasibility an Efficacy of Protection Routing in IP Networks Kin-Wah
More informationIEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 3, JUNE
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 3, JUNE 2011 841 On Combining Shortest-Path and Back-Pressure Routing Over Multihop Wireless Networks Lei Ying, Member, IEEE, Sanjay Shakkottai, Member,
More informationCompiler Optimisation
Compiler Optimisation Michael O Boyle mob@inf.e.ac.uk Room 1.06 January, 2014 1 Two recommene books for the course Recommene texts Engineering a Compiler Engineering a Compiler by K. D. Cooper an L. Torczon.
More informationScheduling in Multihop Wireless Networks Without Back-Pressure
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 22, NO. 5, OCTOBER 2014 1477 Scheduling in Multihop Wireless Networks Without Back-Pressure Shihuan Liu, Member, IEEE, EylemEkici, Senior Member, IEEE, and LeiYing,Member,
More informationREDUCING DEFICIT QUEUE DELAY USING VIRTUAL MEMORY
REDUCING DEFICIT QUEUE DELAY USING VIRTUAL MEMORY N.Deepa 1, V.R.Arulmozhi 2, B.Vijaya Nirmala 3 1,2,3 Assistant Professor/Department of CSE, RVS Educational Trust s Group of Institution Dindigul, Tamilnadu,
More informationUsing Vector and Raster-Based Techniques in Categorical Map Generalization
Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department
More informationA Hybrid Routing Algorithm for Delay Tolerant Networks
Sensors & Transucers 2013 by IFSA http://www.sensorsportal.com A Hybri Routing Algorithm for Delay Tolerant Networs Jianbo LI, Jixing XU, Lei YOU, Chenqu DAI, Jieheng WU Information Engineering College
More informationSpare Capacity Planning Using Survivable Alternate Routing for Long-Haul WDM Networks
Spare Capacity Planning Using Survivable lternate Routing for Long-Haul WDM Networks in Zhou an Hussein T. Mouftah Department of lectrical an Computer ngineering Queen s University, Kingston, Ontario,
More informationSoftware Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency
Software Reliability Moeling an Cost Estimation Incorporating esting-effort an Efficiency Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, an Michael R. Lyu -+ Department of Electrical Engineering Computer Science
More informationLoop Scheduling and Partitions for Hiding Memory Latencies
Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:
More informationTable-based division by small integer constants
Table-base ivision by small integer constants Florent e Dinechin, Laurent-Stéphane Diier LIP, Université e Lyon (ENS-Lyon/CNRS/INRIA/UCBL) 46, allée Italie, 69364 Lyon Ceex 07 Florent.e.Dinechin@ens-lyon.fr
More informationTCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model
TCP Symbiosis: Congestion Control Mechanisms of TCP base on Lotka-Volterra Competition Moel Go Hasegawa Cybermeia Center Osaka University 1-3, Machikaneyama-cho, Toyonaka, Osaka 56-43, JAPAN Email: hasegawa@cmc.osaka-u.ac.jp
More informationAnalytical approximation of transient joint queue-length distributions of a finite capacity queueing network
Analytical approximation of transient joint queue-length istributions of a finite capacity queueing network Gunnar Flötterö Carolina Osorio March 29, 2013 Problem statements This work contributes to the
More informationConsistent Updates in Software Defined Networks: On Dependencies, Loop Freedom, and Blackholes
onsistent Upates in Software Define Networks: On Depenencies, Loop Freeom, an Blackholes Klaus-Tycho Förster ETH urich foklaus@ethz.ch Ratul Mahajan Microsoft Research ratul@microsoft.com Roger Wattenhofer
More information