An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

Size: px
Start display at page:

Download "An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique"

Transcription

1 International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech (CSE), MVR College of Engineering an Technology, A.P., Inia. 2 Asst. Professor, Dept. of Computer Science & Engineering, MVR College of Engineering an Technology, A.P., Inia. Abstract: The basic iea of backpressure techniques is to prioritize transmissions over links that have the highest queue ifferentials. Backpressure metho effectively makes packets flow through the network as though pulle by gravity towars the estination en, which has the smallest queue size of zero. Uner high traffic conitions, this metho works very well, an backpressure is able to fully utilize the available network resources in a highly ynamic fashion. Uner low traffic conitions, however, because many other hosts may also have a small or zero queue size, there is inefficiency in terms of an increase in elay, as packets may loop or take a long time to make their way to the estination en. In this paper we use the concept of shaow queues. Each noe has to maintain some counters, calle as shaow queues, per estination. This is very similar to the iea of maintaining a routing table (for routing purpose) per estination. Using the concept of shaow queues, we partially ecouple routing an the scheuling. A shaow network is maintaine to upate a probabilistic routing table that packets use upon arrival at a noe. The same shaow network, with back-pressure technique, is use to activate transmissions between noes. The routing algorithm is esigne to minimize the average number of hops use by the packets in the network. This iea, along with the scheuling an routing ecoupling, leas to elay reuction compare with the traitional back-pressure algorithm. Keywors: Back pressure, Packets, Routing, Shaow queue. I. INTRODUCTION The back pressure metho first propose in [1] has recently shown a great potential for solving a number of issues in the wireless multi-hop networks. The central iea of back-pressure scheuling moel is that contention among the links shoul be resolve by scheuling the link which has the largest prouct of the queue ifferential backlog between its enpoints an the transmission rate at which the link can be serve. In a perfectly time-slotte meium access mechanism such as TDMA (Time Division Multiple Access), this will result into optimal throughput of flows while guaranteeing the queue stability (ingress traffic to a queue never excees its egress traffic). The utility maximization framework initially propose in [2] shows that iection rates of the flows shoul be chosen such that aggregate utility of the flows is to be maximize. Here the utility of flow represents a esirable effect on the entire network achieve by a particular rate of the flow. It was shown in [3] [4] that the backpressure scheuling an utility base rate control together can solve the global problem of the network utility maximization. The funamental challenge with back pressure metho is that solution of the unerlying scheuling strategy is NP-har [5]. Also, since it was propose for a centralize, time slotte, an synchronize system, a istribute implementation which can achieve even a closer approximation is very ifficult to evelop. Recently, [6] have attempte to incorporate backpressure technique base scheuling in ranom meium access protocols such as CSMA/CA. These protocols try to approximate the performance of the ieal back pressure scheuler by prioritizing the frame transmissions accoring to ifferential backlogs of the queues. Here, every noe in the network maintains a per estination queue (PDQ) an the packets estine to a particular estination host are store in the PDQ of that estination host until further forwaring ecisions are mae. Now, noes share their PDQ information with their neighboring noes, an this information is utilize by every noe to calculate the ifferential backlogs of its PDQs. The ifferential backlog of a PDQ at a noe is equal to the size of the PDQ minus the size of the PDQ of its upstream neighbor towars the estination en. To emulate the back pressure scheuling, the packets of the PDQ which has the highest ifferential backlog (highest back-pressure) in the neighborhoo are given the higher chances for the transmission. This way, the likelihoo that the packets are transmitte from a particular PDQ at a noe is proportional to its ifferential IJMER ISSN: Vol. 4 Iss.9 Sept

2 backlog compare to the ifferential backlogs of PDQs of all noes in the neighborhoo. This prioritization quickly moves the traffic from long back logge queues to the shorter queues achieving an improve throughput an a better overall stability of queues. II. RELATED WORK The first theoretical work on backpressure scheuling technique is the classic result in [1], proving that this queue-ifferential base scheuling metho is throughput optimal (i.e., it can stabilize any feasible rate vector in a network). Since then, researchers have combine the basic backpressure technique with utility optimization to provie a comprehensive approach to the stochastic network optimization [7], [8]. In [9], the authors present a metho whereby only one real queue is maintaine for each neighbor noe, along with virtual counters an shaow queues for all estinations, an show that this yiels elay improvements. In [10], a novel variant of the backpressure scheuling technique is propose which uses hea of line packet elay instea of the queue lengths as the basis of the backpressure weight calculation for each link or commoity, also yieling enhance elay performance. However, these works both assume the existence of the static fixe routes. In [11] an [12], the authors present two works on backpressure routing aime specifically for clusterbase intermittently connecte networks. In [11], the authors evelop a two phase routing metho, combining the backpressure routing with source routing for the cluster-base networks, separating intra cluster routing from inter-cluster routing. They show that this scheme results in large queues at only a subset of the noes, yieling smaller elays than conventional backpressure technique. In [12], the authors implement the abovementione algorithm in a real experimental network an show that the elay improvements empirically. The key ifference of these works from our propose work is that we o not make any assumption about the intermittently connecte network being organize in a cluster base hierarchy an we require no previous knowlege of noes mobility. III. PROPOSED WORK 1. Throughput Optimal Backpressure Algorithm This algorithm works on wireless networks. This back pressure algorithm shoul be epening on one main proceure. The main proceure is the estination queue proceure by using these proceure only we can reucing the poor elay of the time an the istance every noe at the time of routing file in between the two or more locations preestination queues maintaining the two phases: routing algorithm scheuling algorithm. In this system says istance is very high an time is very high. So may raw backs will be occurre at the time of working on the routing algorithm that s why we are implementing a new algorithm. Scheuling algorithm combine with the routing algorithm. Our scheuling algorithm says what to proviing the scheule for prepress of the over come to raw backs that s why we are using the roun robin algorithm an shortest path routing algorithm. In this algorithm proviing quality of services to the en users epening on the service only routing will be ecie it is best routing or the ba routing. QOS may be epens 4 phases: Banwith, frequency, time, istance. In any network epens on QOS. Banwith an frequency is very high an time istance is low QOS is very high. At each link the algorithm assigns a weight to each possible estination noe that is calle back pressure. Define the back pressure at link (n,j) for estination noe at slot t to be: where Qn(t) enotes the number of packets at noe n enote for noe at the beginning of time-slot t. Uner this notation, Qnn (t) =0, t. Assign a weight w to each link (n, j), where w is efine to be the maximum back pressure overall possible estinations. i.e. IJMER ISSN: Vol. 4 Iss.9 Sept

3 2. Min Resource Routing The back-pressure algorithm explores all paths in the entire network an, as a result, may choose paths that are unnecessarily long, which may even contain some loops, thus leaing to poor performance. We aress this problem by introucing a cost function that measures the total amount of the resources use by all flows in the network. Specially, we a up the traffic loas on all links in the network an use this as our cost function. The goal then is to minimize this cost subject to the network capacity constraints. Given a set of packet arrival rates that lie within the capacity area, our goal is to fin the routes for the flows so that we use as few resources as possible in the network. Thus, we formulate the following optimization problem: min s. t. f F x N, n N { }( n, j) L ( ) L f I{ b( f ) n, e( f ) } (ln) L ln ( ) L Figure 1 illustrates how the M back pressure algorithm works in a simple wireline network. All links in the network can be activate simultaneously without interfering with each other. Note that the backlog ifference of route 1 is 6 an the backlog ifference of the route 2 is 4. Because the backlog ifference of the route 2 is smaller than M, the route 2 is blocke at current traffic loa. The M -back-pressure algorithm will automatically choose the route 1, which is shorter. Therefore, a proper M can avoi the long routes in when the traffic is not close to capacity. Fig. 1: Link weights uner the M -back-pressure algorithm. 3. Shaow Queue Algorithm In aitional to the real queues, each noe n also maintains a counter, which is known as shaow queue, pn for each estination. Unlike the real queues, the counters are much easier to maintain even if the number of counters at each noe grows linearly with the size of the overall network. The shaow queues are upate base on the movement of the fictitious entities calle as shaow packets in the network. The movement of the fictitious packets can be thought of as an exchange of the control messages for the purposes of the routing an scheule. Just like the real packets, shaow packets arrive from outsie the network an eventually exit the network. The back-pressure for estination on link (n j)is taken to be as follows: w [ p [ p [ M n j The evolution of the shaow queue p n [ is p n [ t 1] p { ln[ } l:(ln) L n [ ln[ I{ b( f ) n, e( f ) } f F I{ [ } u[ j:( ) L I u a [ f IJMER ISSN: Vol. 4 Iss.9 Sept

4 Where u [ is the number of shaow packets transmitte over the link (n j) in time t. [ is the estination noe that has the max weight on the link (n j). a f [ is the number of shaow packets generate in time t for flow f. 4. Aaptive Routing Algorithm When a packet arrive at a noe, then it use route as follows: Let [ is the number of shaow packets from noe n to the noe j for estination uring time t. Let enote an estimate of the expecte value of [ at time t. At each time slot t, the following sequence of operations occurs at each noe. A packet arriving at noe n for estination is inserte in the real queue P [ [ k:( nk) L nk[ q for next-hop neighbor j with probability: Packets waiting at link (n j) are transmitte over the link when that link is scheule as shown in figure 2. Fig. 2: Probabilistic splitting algorithm at noe IV. CONCLUSION ackpressure scheuling an routing, in which packets are preferentially transmitte over communication links with high queue ifferentials, offers the promise of throughput-optimal operation for a wie range of the communication networks. However, when the traffic loa is very low, ue to the corresponing low queue occupancy, then the backpressure scheuling/routing experiences long elays. This is particularly of concern in the intermittent encounter-base mobile networks which are alreay elay-limite ue to the sparse an highly ynamic network connectivity. While state of the art mechanisms for such networks have propose the use of the reunant transmissions to improve the elay, they o not work well when the traffic loa is high. We ecouple (to a certain egree) routing an scheuling in the network through the use of the probabilistic routing tables an the so-calle shaow queues. We use the same number of shaow queues as the back-pressure technique, but the number of real queues is very small (per neighbor). The new iea here is to perform the routing via probabilistic splitting, which allows the ramatic reuction in the number of the real queues. Finally, an important observation in this work is that the partial ecoupling of the shaow back-pressure an real packet transmission allows us to activate more links than a regular backpressure metho woul. This iea appears to be essential to reuce the elays in the routing case. IJMER ISSN: Vol. 4 Iss.9 Sept

5 REFERENCES [1] L. Tassiulas an A. Ephremies, Stability properties of constraine queueing systems an scheuling policies for maximum throughput in multihop raio networks, ec 1990, pp vol.4. [2] F. Kelly, A. Maulloo, an D. Tan, Rate control in communication networks: shaow prices, proportional fairness an stability, in Journal of the Operational Research Society, vol. 49, [3] L. Chen, S. H. Low, M. Chiang, an J. C. Doyle, Cross-layer congestion control, routing an scheuling esign in a hoc wireless networks, in INFOCOM th IEEE International Conference on Computer Communications. Proceeings, 2006, pp [4] A. Eryilmaz an R. Srikant, Joint congestion control, routing, an mac for stability an fairness in wireless networks, Selecte Areas in Communications, IEEE Journal on, vol. 24, no. 8, pp , [5] M. J. N. Georgiais Leonias an L. Tassiulas, Resource allocation an cross-layer control in wireless networks, in Founations an Trens in Networking, [6] U. Akyol, M. Anrews, P. Gupta, J. Hobby, I. Saniee, an A. Stolyar, Joint scheuling an congestion control in mobile a-hoc networks, april 2008, pp [7] X. Lin, N. Shroff, an R. Srikant, A tutorial on cross-layer optimization in wireless networks, IEEE Journal on Selecte Areas in Communications, vol. 24, no. 8, [8] M. J. Neely, Stochastic network optimization with application to communication an queueing systems, Synthesis Lectures on Communication Networks, vol. 3, no. 1, [9] L. Bui, R. Srikant, an A. Stolyar, Novel architectures an algorithms for elay reuction in back-pressure scheuling an routing, IEEE INFOCOM [10] B. Ji, C. Joo, an N. Shroff, Delay-base back-pressure scheuling in multi-hop wireless networks, IEEE INFOCOM, [11] J. Ryu, L. Ying, an S. Shakkottai, Back-pressure routing for intermittently connecte networks, IEEE INFOCOM [12] J. Ryu, V. Bhargava, N. Paine, an S. Shakkottai, Back-pressure routing an rate control for icns, ACM Mobicom, IJMER ISSN: Vol. 4 Iss.9 Sept

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stolyar Abstract Backpressure-base aaptive routing

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stoylar arxiv:15.4984v1 [cs.ni] 27 May 21 Abstract

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:

More information

Packet Aggregation based Back-pressure Scheduling in Multi-hop Wireless Networks

Packet Aggregation based Back-pressure Scheduling in Multi-hop Wireless Networks Packet Aggregation based Back-pressure Scheduling in Multi-hop Wireless Networks Gaurish Deuskar, Parth H. Pathak, Rudra Dutta Department of Computer Science, North Carolina State University, Raleigh,

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,

More information

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly

More information

On the Placement of Internet Taps in Wireless Neighborhood Networks

On the Placement of Internet Taps in Wireless Neighborhood Networks 1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach Nishi Sharma, Vanna Verma Abstract Wireless sensor networks (WSNs) is one of the emerging fiel of research in recent era

More information

ADAPTIVE ROUTING IN COMMUNICATION NETWORKS USING CELL BREATHING BASED BACKPRESSURE ALGORITHM

ADAPTIVE ROUTING IN COMMUNICATION NETWORKS USING CELL BREATHING BASED BACKPRESSURE ALGORITHM Indian Journal of Communications Technology and Electronics (IJCTE) Vol.2.No.1 2014pp 13-17. available at: www.goniv.com Paper Received :05-03-2014 Paper Published:28-03-2014 Paper Reviewed by: 1. John

More information

Lab work #8. Congestion control

Lab work #8. Congestion control TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño

More information

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients Probabilistic Meium Access Control for 1 Full-Duplex Networks with Half-Duplex Clients arxiv:1608.08729v1 [cs.ni] 31 Aug 2016 Shih-Ying Chen, Ting-Feng Huang, Kate Ching-Ju Lin, Member, IEEE, Y.-W. Peter

More information

A Survey on Congestion Control and Maximization of Throughput in Wireless Networks

A Survey on Congestion Control and Maximization of Throughput in Wireless Networks A Survey on Congestion Control and Maximization of Throughput in Wireless Networks K.Ravindra Babu Post graduate student V.R.Siddhartha Engineering College ravindra.bec2008@gmail.com J.Ranga Rao Assistant

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

A Distributed CSMA Algorithm for Maximizing Throughput in Wireless Networks

A Distributed CSMA Algorithm for Maximizing Throughput in Wireless Networks International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 2, Number 2 (2012), pp. 125-132 International Research Publications House http://www. ripublication.com A Distributed

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,

More information

Supporting Fully Adaptive Routing in InfiniBand Networks

Supporting Fully Adaptive Routing in InfiniBand Networks XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks Hinawi Publishing Corporation International Journal of Distribute Sensor Networks Volume 2014, Article ID 936379, 17 pages http://x.oi.org/10.1155/2014/936379 Research Article REALFLOW: Reliable Real-Time

More information

Ad-Hoc Networks Beyond Unit Disk Graphs

Ad-Hoc Networks Beyond Unit Disk Graphs A-Hoc Networks Beyon Unit Disk Graphs Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich 8092 Zurich, Switzerlan {kuhn, wattenhofer, zollinger}@inf.ethz.ch ABSTRACT

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

A CLASSIFICATION FRAMEWORK FOR SCHEDULING ALGORITHMS IN WIRELESS MESH NETWORKS Lav Upadhyay 1, Himanshu Nagar 2, Dharmveer Singh Rajpoot 3

A CLASSIFICATION FRAMEWORK FOR SCHEDULING ALGORITHMS IN WIRELESS MESH NETWORKS Lav Upadhyay 1, Himanshu Nagar 2, Dharmveer Singh Rajpoot 3 A CLASSIFICATION FRAMEWORK FOR SCHEDULING ALGORITHMS IN WIRELESS MESH NETWORKS Lav Upadhyay 1, Himanshu Nagar 2, Dharmveer Singh Rajpoot 3 1,2,3 Department of Computer Science Engineering Jaypee Institute

More information

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance International Journal of Moern Communication Technologies & Research (IJMCTR) Impact of FTP Application file size an TCP Variants on MANET Protocols Performance Abelmuti Ahme Abbasher Ali, Dr.Amin Babkir

More information

Optimizing Scheduling Policies and Analyzing Delay in Multi-Hop Wireless Networks P.Pavan kumar Reddy 1, Manohar Gosul 2

Optimizing Scheduling Policies and Analyzing Delay in Multi-Hop Wireless Networks P.Pavan kumar Reddy 1, Manohar Gosul 2 Optimizing Scheduling Policies and Analyzing Delay in Multi-Hop Wireless Networks P.Pavan kumar Reddy 1, Manohar Gosul 2 1 M.Tech in CSE Dept, 2 Associate Professor Abstract: In this paper a multi-hop

More information

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member

More information

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks Optimal Routing an Scheuling for Deterministic Delay Tolerant Networks Davi Hay Dipartimento i Elettronica olitecnico i Torino, Italy Email: hay@tlc.polito.it aolo Giaccone Dipartimento i Elettronica olitecnico

More information

MOBILE data is continuing to grow exponentially, and

MOBILE data is continuing to grow exponentially, and IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 25, NO. 3, JUNE 2017 1431 Enhancing Mobile Networks With Software Define Networking an Clou Computing Zizhong Cao, Stuent Member, IEEE, Shivenra S. Panwar, Fellow,

More information

Content Caching and Scheduling For Clusters with Elastic and Inelastic Traffic

Content Caching and Scheduling For Clusters with Elastic and Inelastic Traffic International Journal of Research Studies in Science, Engineering and Technology Volume 3, Issue 1, January 2016, PP 1-5 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) Content Caching and Scheduling

More information

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita

More information

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter FDL sel. VOA SOA 100 Regular papers ONDM 2018 Scalable Deterministic Scheuling for WDM Slot Switching Xhaul with Zero-Jitter Bogan Uscumlic 1, Dominique Chiaroni 1, Brice Leclerc 1, Thierry Zami 2, Annie

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

Static Round-Robin Dispatching Schemes for Clos-Network Switches'

Static Round-Robin Dispatching Schemes for Clos-Network Switches' Static RounRobin Dispatching Schemes for ClosNetwork Switches' Konghong Pun Mounir Hami Department of Computer Science Hong Kong University of Science an Technology Clear Water Bay, Kowloon, Hong Kong

More information

Fast Fractal Image Compression using PSO Based Optimization Techniques

Fast Fractal Image Compression using PSO Based Optimization Techniques Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting

More information

CONGESTION CONTROL BASED ON SLIDING MODE CONTROL AND SCHEDULING WITH PRIORITIZED QUEUING FOR WIRELESS NETWORKS

CONGESTION CONTROL BASED ON SLIDING MODE CONTROL AND SCHEDULING WITH PRIORITIZED QUEUING FOR WIRELESS NETWORKS CONGESTION CONTROL BASED ON SLIDING MODE CONTROL AND SCHEDULING WITH PRIORITIZED QUEUING FOR WIRELESS NETWORKS R.Keerthana 1, S.Lavanya 2 1 PG Scholar, Dept. of CSE, Sona College of Technology, Salem 636005,

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,

More information

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks Provisioning Virtualize Clou Services in IP/MPLS-over-EON Networks Pan Yi an Byrav Ramamurthy Department of Computer Science an Engineering, University of Nebraska-Lincoln Lincoln, Nebraska 68588 USA Email:

More information

Scheduling in Multihop Wireless Networks without Back-pressure

Scheduling in Multihop Wireless Networks without Back-pressure Forty-Eighth Annual Allerton Conerence Allerton House, UIUC, Illinois, USA September 29 - October 1, 2010 Scheduling in Multihop Wireless Networks without Back-pressure Shihuan Liu, Eylem Ekici, and Lei

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

A SWARM INSPIRED MULTIPATH DATA TRANSMISSION WITH CONGESTION CONTROL IN MANETS USING PROBABILISTIC APPROACH

A SWARM INSPIRED MULTIPATH DATA TRANSMISSION WITH CONGESTION CONTROL IN MANETS USING PROBABILISTIC APPROACH A SWARM INSPIRED MULTIPATH DATA TRANSMISSION WITH CONGESTION CONTROL IN MANETS USING PROBABILISTIC APPROACH Subhankar oarar 1, Vanana Bhattacheree 2 an Debasis Giri 1 1 Department of Computer Science an

More information

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM International Journal of Physics an Mathematical Sciences ISSN: 2277-2111 (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

Dual Arm Robot Research Report

Dual Arm Robot Research Report Dual Arm Robot Research Report Analytical Inverse Kinematics Solution for Moularize Dual-Arm Robot With offset at shouler an wrist Motivation an Abstract Generally, an inustrial manipulator such as PUMA

More information

Overview : Computer Networking. IEEE MAC Protocol: CSMA/CA Internet mobility TCP over noisy links

Overview : Computer Networking. IEEE MAC Protocol: CSMA/CA Internet mobility TCP over noisy links Overview 15-441 15-441: Computer Networking 15-641 Lecture 24: Wireless Eric Anerson Fall 2014 www.cs.cmu.eu/~prs/15-441-f14 Internet mobility TCP over noisy links Link layer challenges an WiFi Cellular

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

PAPER. 1. Introduction

PAPER. 1. Introduction IEICE TRANS. COMMUN., VOL. E9x-B, No.8 AUGUST 2010 PAPER Integrating Overlay Protocols for Proviing Autonomic Services in Mobile A-hoc Networks Panagiotis Gouvas, IEICE Stuent member, Anastasios Zafeiropoulos,,

More information

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural

More information

Congestion Control using Cross layer and Stochastic Approach in Distributed Networks

Congestion Control using Cross layer and Stochastic Approach in Distributed Networks Congestion Control using Cross layer an Stochastic Approach in Distribute Networks Selvarani R Department of Computer science an Engineering Alliance College of Engineering an Design Bangalore, Inia Vinoha

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Cross-Layer Optimization for Wireless Networks with Multi-Receiver Diversity

Cross-Layer Optimization for Wireless Networks with Multi-Receiver Diversity Cross-Layer Optimization for Wireless Networks with Multi-Receiver Diversity 1 2 3 error broadcasting Michael J. Neely University of Southern California http://www-rcf.usc.edu/~mjneely/ Comm Theory Workshop,

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

Just-In-Time Software Pipelining

Just-In-Time Software Pipelining Just-In-Time Software Pipelining Hongbo Rong Hyunchul Park Youfeng Wu Cheng Wang Programming Systems Lab Intel Labs, Santa Clara What is software pipelining? A loop optimization exposing instruction-level

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Divide-and-Conquer Algorithms

Divide-and-Conquer Algorithms Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:

More information

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which

More information

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu

More information

Image Segmentation using K-means clustering and Thresholding

Image Segmentation using K-means clustering and Thresholding Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,

More information

Adjusted Probabilistic Packet Marking for IP Traceback

Adjusted Probabilistic Packet Marking for IP Traceback Ajuste Probabilistic Packet Marking for IP Traceback Tao Peng, Christopher Leckie, an Kotagiri Ramamohanarao 2 ARC Special Research Center for Ultra-Broaban Information Networks Department of Electrical

More information

Performance Modelling of Necklace Hypercubes

Performance Modelling of Necklace Hypercubes erformance Moelling of ecklace ypercubes. Meraji,,. arbazi-aza,, A. atooghy, IM chool of Computer cience & harif University of Technology, Tehran, Iran {meraji, patooghy}@ce.sharif.eu, aza@ipm.ir a Abstract

More information

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie

More information

Blocking Avoidance in Wireless Networks

Blocking Avoidance in Wireless Networks Blocking Avoidance in Wireless Networks Shanyu Zhou University of Illinois at Chicago szhou45@uic.edu Hulya Seferoglu University of Illinois at Chicago hulya@uic.edu Erdem Koyuncu University of California,

More information

Discrete Markov Image Modeling and Inference on the Quadtree

Discrete Markov Image Modeling and Inference on the Quadtree 390 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 9, NO. 3, MARCH 2000 Discrete Markov Image Moeling an Inference on the Quatree Jean-Marc Laferté, Patrick Pérez, an Fabrice Heitz Abstract Noncasual Markov

More information

Optimal Link Capacity Dimensioning in Proportionally Fair Networks

Optimal Link Capacity Dimensioning in Proportionally Fair Networks Optimal Link Capacity Dimensioning in Proportionally Fair Networks Micha l Pióro 1,Gábor Malicskó 2, an Gábor Foor 3 1 Department of Communication Systems, Lun Institute of Technology, Sween, Michal.Pioro@telecom.lth.se

More information

Optimal Oblivious Path Selection on the Mesh

Optimal Oblivious Path Selection on the Mesh Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract

More information

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Cascading Multi-Hop Reservation and Transmission in Underwater Acoustic Sensor Networks

Cascading Multi-Hop Reservation and Transmission in Underwater Acoustic Sensor Networks Sensors 2014, 14, 18390-18409; oi:10.3390/s141018390 Article OPEN ACCESS sensors ISSN 1424-8220 www.mpi.com/journal/sensors Cascaing Multi-Hop Reservation an Transmission in Unerwater Acoustic Sensor Networks

More information

Optimal Distributed P2P Streaming under Node Degree Bounds

Optimal Distributed P2P Streaming under Node Degree Bounds Optimal Distribute P2P Streaming uner Noe Degree Bouns Shaoquan Zhang, Ziyu Shao, Minghua Chen, an Libin Jiang Department of Information Engineering, The Chinese University of Hong Kong Department of EECS,

More information

Minimization of Congestion using Backpressure Routing Algorithm in Wireless Networks

Minimization of Congestion using Backpressure Routing Algorithm in Wireless Networks Vol. 3, Issue. 3, May.-June. 2013 pp-1681-1689 ISSN: 2249-6645 Minimization of Congestion using Backpressure Routing Algorithm in Wireless Networks A. Priyadharsini, Mr. S. Mohanarangan, Dr. D. Sivakumar

More information

EFFICIENT MULTICAST DATA REPLICATION APPROACH FOR POWER CONSUMPTION IN MANET

EFFICIENT MULTICAST DATA REPLICATION APPROACH FOR POWER CONSUMPTION IN MANET EFFICIENT MULTICAST DATA REPLICATION APPROACH FOR POWER CONSUMPTION IN MANET 1 T.KARTHIKEYAN, 2 DR.A.RAJARAM 2 Research Scholar, Karpagam University, Coimbatore, Inia 1 Associate Professor, Department

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

On the Feasibility and Efficacy of Protection Routing in IP Networks

On the Feasibility and Efficacy of Protection Routing in IP Networks University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering 2-0-2009 On the Feasibility an Efficacy of Protection Routing in IP Networks Kin-Wah

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 3, JUNE

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 3, JUNE IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 3, JUNE 2011 841 On Combining Shortest-Path and Back-Pressure Routing Over Multihop Wireless Networks Lei Ying, Member, IEEE, Sanjay Shakkottai, Member,

More information

Compiler Optimisation

Compiler Optimisation Compiler Optimisation Michael O Boyle mob@inf.e.ac.uk Room 1.06 January, 2014 1 Two recommene books for the course Recommene texts Engineering a Compiler Engineering a Compiler by K. D. Cooper an L. Torczon.

More information

Scheduling in Multihop Wireless Networks Without Back-Pressure

Scheduling in Multihop Wireless Networks Without Back-Pressure IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 22, NO. 5, OCTOBER 2014 1477 Scheduling in Multihop Wireless Networks Without Back-Pressure Shihuan Liu, Member, IEEE, EylemEkici, Senior Member, IEEE, and LeiYing,Member,

More information

REDUCING DEFICIT QUEUE DELAY USING VIRTUAL MEMORY

REDUCING DEFICIT QUEUE DELAY USING VIRTUAL MEMORY REDUCING DEFICIT QUEUE DELAY USING VIRTUAL MEMORY N.Deepa 1, V.R.Arulmozhi 2, B.Vijaya Nirmala 3 1,2,3 Assistant Professor/Department of CSE, RVS Educational Trust s Group of Institution Dindigul, Tamilnadu,

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

A Hybrid Routing Algorithm for Delay Tolerant Networks

A Hybrid Routing Algorithm for Delay Tolerant Networks Sensors & Transucers 2013 by IFSA http://www.sensorsportal.com A Hybri Routing Algorithm for Delay Tolerant Networs Jianbo LI, Jixing XU, Lei YOU, Chenqu DAI, Jieheng WU Information Engineering College

More information

Spare Capacity Planning Using Survivable Alternate Routing for Long-Haul WDM Networks

Spare Capacity Planning Using Survivable Alternate Routing for Long-Haul WDM Networks Spare Capacity Planning Using Survivable lternate Routing for Long-Haul WDM Networks in Zhou an Hussein T. Mouftah Department of lectrical an Computer ngineering Queen s University, Kingston, Ontario,

More information

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency Software Reliability Moeling an Cost Estimation Incorporating esting-effort an Efficiency Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, an Michael R. Lyu -+ Department of Electrical Engineering Computer Science

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Table-based division by small integer constants

Table-based division by small integer constants Table-base ivision by small integer constants Florent e Dinechin, Laurent-Stéphane Diier LIP, Université e Lyon (ENS-Lyon/CNRS/INRIA/UCBL) 46, allée Italie, 69364 Lyon Ceex 07 Florent.e.Dinechin@ens-lyon.fr

More information

TCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model

TCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model TCP Symbiosis: Congestion Control Mechanisms of TCP base on Lotka-Volterra Competition Moel Go Hasegawa Cybermeia Center Osaka University 1-3, Machikaneyama-cho, Toyonaka, Osaka 56-43, JAPAN Email: hasegawa@cmc.osaka-u.ac.jp

More information

Analytical approximation of transient joint queue-length distributions of a finite capacity queueing network

Analytical approximation of transient joint queue-length distributions of a finite capacity queueing network Analytical approximation of transient joint queue-length istributions of a finite capacity queueing network Gunnar Flötterö Carolina Osorio March 29, 2013 Problem statements This work contributes to the

More information

Consistent Updates in Software Defined Networks: On Dependencies, Loop Freedom, and Blackholes

Consistent Updates in Software Defined Networks: On Dependencies, Loop Freedom, and Blackholes onsistent Upates in Software Define Networks: On Depenencies, Loop Freeom, an Blackholes Klaus-Tycho Förster ETH urich foklaus@ethz.ch Ratul Mahajan Microsoft Research ratul@microsoft.com Roger Wattenhofer

More information