An Infrastructureless End-to-End High Performance Mobility Protocol

Size: px
Start display at page:

Download "An Infrastructureless End-to-End High Performance Mobility Protocol"

Transcription

1 Proceeings of the 5 IEEE International Conference on Electro Information Technology, 5, Lincoln Nebraska, May 5 An Infrastructureless En-to-En High Performance Mobility Protocol Saneep Davu, Rai Y. Zaghal an Jave I. Khan {savo, rzaghal, jave }@cs.kent.eu Networking an Meia Communications Research Laboratories Computer Science Dept., Kent State University 33 MSB, Kent, OH 444 ABSTRACT Mobile IP is offers isconnection free hanoff by assuming availability of infrastructure. It requires intermeiate software agents in the network to be eploye ahea of time to circumvent IPs normal moe ientity base routing. This infrastructure base mobility management though offers connectivity but incurs significant hanoff an tunneling elays along with eployment costs. In this paper we emonstrate an alternate mobility scheme which oes not require any such infrastructure an uses only en-point technique an yet provies much faster loss-free hanoff. This En-to-En scheme name Interactive Protocol for Mobile Networks (IPMN) neither requires any functional changes to the network layers on the sening an receiving host machines nor an infrastructure in the network. It intelligently performs hanoff base on information provie by MAC Layer. The network aress change is hanle by renewing the existing connections by manipulating the TCP/IP stack at the en-points. Besies, the ifference in eployment scenarios, the IPMN offers blazingly fast event base hanoff an much faster an simplifie transport (no tunneling elay) than MIP. We provie a etail moel base performance comparison between the two. 1 INTRODUCTION Mobile IP (MIP) [1] is being use wiely currently to hanle mobility in TCP/IP network. In TCP/IP the ientity of a noe an all corresponing routing is inicate an manage by the same ientifier. At application level a connection is ientifie using the four tuple <source aress, source port, estination aress, estination port>. A L3 hanoff changes network aress resulting in stale non-routable connections. MIP aresses this problem by aing an inirection to the routing mechanism in the form of home agent (HA) an foreign agent (FA). In MIP a hanoff is etecte when a Mobile Noe (MN) leaves the present service area an enters a new agent s service area. The ifference between the service areas is ientifie by sensing a form of Agent Avertisements (AA). This requires FA to perioically an continually broacast a small signal. The next issue is to circumvent the static ientity attache routing. This is one by registering the MN to a new foreign agent an upating the same at the HA. To isable the MN s ientity base routing a tunnel is create from MN s HA to FA, where the actual IP packet ries insie another packet from HA to the FA. The return path from MN to Corresponing Host (CH) is irectly route through the FA without requiring any intervention of HA. The solution logically hanles the IP mobility, but also shows the following artifacts. The first is relate to inirection. This creates a triangular pattern an hence this system is also referre to as triangular routing. Resulting forwar path an return path also becomes asymmetric. The secon is performance. The mobility etection epens on beacon. The timer base avertisements place an upper boun on the hanoff elay. These elays egrae the transport an application level performance. Too fast a timer creates excessive network overhea, on the other han a slow beacon (which is use in most cases), elays the entire mobility management an in practice reacts aversely with the upper layer transport timers. Currently, it almost prohibits the use of connection oriente transport such as TCP [17,18]. Besies the above artifacts, MIP also requires infrastructure. It requires a significant mechanism to hie the aress change from higher layers. It also ictate the strong nee for an infrastructure implying greater eployment an management costs. Specifically it requires new IP layer in MN, HA & FA. In many scenarios however, the above moel of mobility hanling is inconvenient. Many are sensitive to triangulate long roun trip elay. For example, consier a remote surgery requiring highly reliable an time sensitive ata elivery. Many avance applications require connection oriente transport. All avance istribute applications funamentally require reliable connection. Even if they are force to use UDP- they have to anyway replicate the reliability an connection states at the upper level. Also in many scenarios the infrastructure might not be available at all. An example of this is a corporate business having branches sprea all over the country. It cannot change the alreay existing infrastructure to suit the mobility management rather they woul like something to work with the alreay existing infrastructure. In this paper we emonstrate a mobility solution which is base on only en-point technique. Further the change at the en-points is mostly restricte at application level. It is base on a new en-point network software architecture calle interactive transparent networking paraigm (InTRAN) [1, 11]. This new en-point network software architecture allows event base access to protocol states 1

2 Proceeings of the 5 IEEE International Conference on Electro Information Technology, 5, Lincoln Nebraska, May 5 by network layer processes or by L7 processes. The new scheme oes not require the battery of pre-eploye FAs in the Internet (thus the nee of an infrastructure!). Besies, offering avantage of being infrastructure-less, this also offer major performance avantage. It oes not require HA an thus any route inirection, can avoi triangulation, is loss-free, eliminates tunneling overhea (significantly reuce jitter or elay) an above all offer much faster hanoff. Before presenting this new approach, in the following section we first present a brief review of the current mobility hanling techniques in TCP/IP framework. Section 3 then explains the new interactive transparent networking paraigm. Section 4 then presents the propose scheme. In section 5 we show the etail performance moel of the scheme. For comparison we also present a moel of MIP. Finally in section 6 we present a comparative performance analysis of the propose scheme in managing selecte scenarios. RELATED WORK Mobility solutions can be categorize in two broa approaches- one which hanles mobility fully at the networking layers, hiing any changes in the network structure from the en systems. The others, those hanle mobility at the transport layers an involves only the en systems. Below we briefly present these two approaches..1 Network versus Higher Layer Solutions Mobile IP [1] provie a first effective crack of hanling mobility. It is now an IETF stanar an most common protocol in practice. Though this solve the problem of hanling stale connections, it introuce lots of communication overhea an longer triangular routing paths. Triangulation of routes can be reuce by enhancing Mobile IP with Route Optimization [] presente by Perkins an Johnson. The CH optimizes the route by maintaining a bining cache for each MN s care-of-aress. Base on this information a irect tunnel from CH to MN is create efying any further involvement of HA. MN nees to upate CH of its current care-of-aress explicitly uring each hanoff, accruing alreay complex MIP. Hint base hanoffs in [3] use triggers from L as hints to L3 about an impening hanoff. This eliminate the cost an complexity of avertisement base movement etection. [] also uses assistance form link layer to perform fast Mobile IP hanoff through MAC briging. The RAT (Reverse Aress Translation) architecture [4], base on the network aress translation (NAT) protocol, uses packet re-irection service between CH an MN to support IP mobility. However, both the techniques require functional enhancement of the layers involve. Higher layer solutions mostly involving TCP hanle mobility ifferently, using the split connection approach. Inirect-TCP [5, 9] splits the wire an wireless parts of the connection using the Base Station (BS) as a common en point. The state information of the connection is transferre between the ol BS an new BS transparently uring hanoffs. MSOCKS [8] achieves connection reirection using split connection proxy. TCP-R[1] is base on an iea- same as ours, renewing the connection to hanle the new IP aress. But their scheme bases its iea on the conventional timer base approach an hence lacke the robustness an scalability. Freeze-TCP[6], though oes not hanle mobility irectly, ais the TCP performance by freezing the connection uring perios of isconnection.. Our Approach In compare to the above approaches the solution we propose has several istinguishing characteristics. First the mobility reactions are event base as oppose to perioicity epenent. Seconly, the solution oes not require any significant overhauling of the existing protocols rather works in L7. The InTraN enables networking layer protocol events to be orerly an securely subscribe an respone at L7 without requiring functional moification of the existing protocols- with much simpler protocol meta-engineering. This is an interesting iversion from previous thinking that application layer solutions may slow own the overall performance. We show by moeling an analysis that the premium is much less than suspecte- almost negligible. On the other han- since mobility tracking an corresponing reconnection responses can be generate at application layer- its eployment is much easier an also the strategies can be mae much more sophisticate an powerful. Inee the scheme we show incorporates an extens the strengths of several previous approaches. It coul thus offer a ramatically improve hanoff performance- far out weighing the cost. 3 INTERACTIVE TRANSPARENT NETWORKING The framework assumes a transparent encasement of protocol functionality by making a subset of its internal protocol states an events visible to its service subscriber layer. It provies means to allow programs in upper layers to subscribe liste events in lower layers an be notifie when these (state transitions) occur. Upon notification, subscriber processes can further pull up the liste service states. Typically an application program can register an event hanler chil process calle Transientware to hanle a specific event. The transientware is an application level programmable process an thus can perform various aaptive intelligent actions at L7. Figure-1 shows the general architecture of an example interactive version of

3 Proceeings of the 5 IEEE International Conference on Electro Information Technology, 5, Lincoln Nebraska, May 5 user space system Kernel Application TCP Connectio Socket API 1 TCP kernel Subscription API 5 Event Monitor T-ware (1) Signal Hanler 3a 3b T-ware () 4a 4b Event Information Figure 1. TCP interactive extension an API. 7 Probing API T-ware (n) 6b Connection State 6a 4 INTERACTIVE PROTOCOL FOR MOBILE NETWORKS (IPMN) 4.1 Overview of Wireless Environment In a wireless scenario L hanoff is initiate by the MN when the Signal/Noise ratio an Signal strength of the current Access Point (AP) falls behin a certain threshol. To have a better unerstaning of the architecture let us first explain briefly the two wireless scenarios existing an how our architecture robustly hanles both while performing a L hanoff. When an MN receives service from more than one access point at any point of time then their areas of coverage are overlapping, which generally happens at the bounaries of the cells an this is calle Overlapping cell bounaries. Overlapping cell bounaries as shown in figure (a) have better performance in our approach as applications probing link layer yiels information about a b Fig Cell Bounaries a) Overlapping b) Non-Overlapping TCP. Upon opening the socket, an aaptive application may bin a Transientware moule to a esignate TCP event by subscribing with the kernel. This is represente by arrows 1 an in figure-1. The bining is optional; if the application chooses not to subscribe, the system efaults to the silent moe ientical to TCP classic. When the event occurs in TCP, the kernel sens a signal to the upper layers (3a) an at the same time it saves the event information (3b). A special hanler catches the signal an probes the kernel for the event type (4a, 4b), The hanler then invokes the appropriate Transientware moule to serve the event (5). A Transientware moule can also use the probing API to access the kernel state (6a, 6b) or to pass some information to the subscriber application itself (7). A freebsd version InTraN kernel an corresponing interactive protocols incluing itcp has been recently implemente [1, 11]. the next possible AP that woul serve MN after the hanoff. This information ais faster L3 hanoffs which woul be iscusse in etail later in the section. At times MN may encounter temporary layer isconnections, encountere ue to isjoint coverage area as shown in figure (b). This type of coverage is calle Non-Overlapping cell bounaries. Probing the link layer will not yiel any useful information. 4. Architecture In this section we will iscuss in etail the architecture of our approach which we have name Interactive Protocol for Mobile Networks (IPMN). This event-riven moel has network layer events (like congestion, retransmission, hanoff, etc.,) that the application can subscribe so that the application can be notifie upon occurrence of that event in the network layer. L hanoff consists of three steps a) probing, b) authentication an c) re-association explaine in etail in the next section. The hanoff proceure is 3

4 Proceeings of the 5 IEEE International Conference on Electro Information Technology, 5, Lincoln Nebraska, May 5 starte when the application receives a L trigger notifying an impening hanoff. Application woul then let the TCP layer avertise a zero winow temporarily interrupting the ata flow. Another signal triggers the application to notify the completion of the authentication process in L layer. Here the overlapping scenario an non-overlapping scenario follow ifferent approaches. In overlapping case probing the link layer now woul give information about the Future Access Point (FAP). This information is use to registers an IP aress for MN even before the completion of L hanoff. After getting the aress the same connection is renewe by manipulating the TCP/IP stack at both the en points. The application unfreezes the connection after manipulating the TCP stack. Since IP aress is attaine almost in parallel with L hanoff we reuce the hanoff latency by a great extent. In non-overlapping case the system waits until it gets an IP aress normally through DHCP. After obtaining the new IP the rest of the process follows as explaine earlier. Freezing the connection uring hanoff avois congestion control algorithms an increasing the performance of the transport layer. We are trapping 4 events, two state variable upate from three layers an corresponing 5 transientware processes in orer to provie mobility support. Figure-3 gives the architecture an event sequencing of IPMN. Probing in L is initiate when the Signal-to-Noise Ratio (SNR) of the current AP falls below a certain threshol. At the MN, the subscribing application (L7) is notifie of an impening hanoff after probing (event 1) is complete. When the event is receive at the L7, a Transientware moule (Hanler 1) is activate immeiately; this moule makes a system call Freeze which lets TCP avertise a zero winow temporarily interrupting the ata transmission. Freezing the connection uring hanoff avois TCP congestion control algorithms by invoking the persist timer. In overlapping case successful L authentication (event ) triggers L7 about the same. Hanler then probes L to ientify the cell bounary conition (if the probe yiels at least one AP then the cell bounaries are overlapping. Here we assume that the current connection is still vali) an extract information about the Future Access Point (FAP). MN uses this information to register with Future AP an attain an IP aress (L3 hanoff) in parallel with L hanoff. Hanler3 upon initiation transmits the IP aress to the CH through a system callrelayip an also manipulates the SourceIP fiel in the TCP substrate. A special TCP segment with option = SWITCH_IP is sent to the CH. On reception of this special segment at CH (event 5), Hanler5 is activate, which manipulates the DestinationIP fiel in the TCP substrate with the newly receive IP aress. MN on reception of an ACK for SWITCH_IP segment (event 4), invokes Wakeup Hanler allowing MN to resume the communication by avertising a non-zero winow to the CH. In non-overlapping case MN waits until L hanoff is complete an a DHCP IP aress (event 6) is assigne. Hanler3 is then invoke which probes IP layer to get the IP aress. The same process as explaine in the previous case follows when RelayIP Hanler is initiate. The timing iagrams of both overlapping an non-overlapping cases are epicte in the timing figures 4(a) an 4(b) respectively. E1, E an E5 are events that trigger the hanlers in overlapping case while E1, E5 an E6 trigger the respective hanlers in non-overlapping scenario. 5 FORMULATION OF HANDOFF LATENCY We ivie the hanoff process into two subsets an formulate the latency for each of the subset Layer hanoff an Layer3 hanoff. Depening on the cell 4

5 Proceeings of the 5 IEEE International Conference on Electro Information Technology, 5, Lincoln Nebraska, May 5 bounary conition the latency woul change yieling ifferent results. 5.1 Link Layer Hanoff Latency Link layer (8.11) hanoff can be classifie into 3 categories accoring to [13, 14, 18] a) Probing, b) Authentication an c) Association/Re-Association. Each of these categories woul constitute a elay parameter to L hanoff latency. Probing: Probing is one by a MN to etermine the availability of a wireless network an perform a L hanoff. A MN sens a probe request an waits for a reply governe by two timers. MinChanneltime(T e ) minimum time that a MN nees to wait after sening a probe request. If there is no activity in the channel for MinChanneltime then the channel is consiere empty. MaxChanneltime (T u ) time for MN to get a response from a use channel. In [14] Velayos an Karlsson et al., trie to estimate the various 8.11 hanoff elays an trie to optimize the hanoff latency. If u an e are the number of use an empty channels respectively, then the total time to probe the network calle the Scan Delay S can be compute as in Eq 1(a). S = u * Tu + e * T...1(a) e Furthermore both T u an T e sen probe requests twice so as to minimize the possibility of these probe packets being lost. Values of T u an T e are irectly epenent of the transmission elay T governe by the loa of the channel. Tu = * T + MaxChannelTime Te = * T + MinChannelTime...1(b) The transmission elay T can be moele as a function (Eq 1(b)) as the contention for the channel an retransmission (both being the critical parts of T ) always follow the ranomize binary exponential backoff. Equations 1(a), 1(b) an 1(c) will give the total probing elay. Authentication: This is the process that valiates whether the MN can use the services of an AP. T = ft ( t) t...1(c) If a mutually acceptable level of authentication has not been establishe between an AP an MN then, association/re-association woul not be establishe. The MN after probing the channels an obtaining the list of Access Points in range tries to prioritize them base on numerous criteria. The MN will sen an authentication request to the first entry in the list of prioritize APs an waits for an authentication reply. A = n ( * T + PTa ) i= 1 Where 1 n u 1() If the reply inicates a successful authentication then reassociation proceure is starte. If there is an unsuccessful authentication then the same proceure is repeate with the next entry until successful authentication. Re-Association: After successful authentication the MN s state information is transferre from the ol AP to new AP. Re-association is helpful in knowing the current attachment point of the MN as it is moving from AP to AP. Re-Association elay (RA ) is the request/response sequence RTT plus the time to exchange state information between the ol an the new AP(P Tr ). RA = * T + P...1(e) Tr 5. Hanoff Latency in Higher Layers. There are 5 system calls that are use to invoke hanlers. The latencies of these system calls range from 1µs to 1µs. Each system call will have latency Syc given by a ranom variable X between the aforementione intervals. Syc = Xµ s where 1 X 1 (a) In the same way the triggering latencies are between 5 an µs which is represente as Tg an governe by a ranom variable Y ranging form 5 to. Tg = Yµ s where 5 X...(b) MN woul irectly contact the Future AP to pro-actively register itself an get an IP aress. This elay terme as proactive registration elay(pr ) constitutes of the RTT between the MN an the PAP through the present AP T1. PR = * T1...(c) Where T1 is T1 = f 1 ( t) t t...() We have observe rountrip times for various emographic istances up to 4 miles an observe the fact that it is practically impossible to have access points whose emographic istance is more than 4 miles. This implies that RTT latency woul fall between 1µs to 1ms epening on the istance. Table 1 gives the hanoff elay in both overlapping an non-overlapping cases. From Eqs 1(), 1(e), (a) an (b) we have the elay of Overlapping cell bounary given by Equation (3). T = S + Tg + max max ( A, Syc ) ( RA, 3* Syc + PR + Ep ) + Syc + * Tg + Where max(a1, a) gives the maximum value of a1 an a, an represents the overlapping latencies. EP is the 3 5

6 Proceeings of the 5 IEEE International Conference on Electro Information Technology, 5, Lincoln Nebraska, May MIP Message Arrival Times IPMN Time (secs) 3 1 Roun Trip Time between en points of the connection governe by Relay Hanler. In Non-Overlapping cell bounaries the probe elay S no prolongs until it hears from at least one AP, also taking into account the time to traverse between the coverage areas. From Eqs 1(), 1(e), 1(f), (a) an (b) we have the total hanoff elay for non-overlapping cells T no is as given in Equation (4). Tn = S + Tg + max( A, Syc ) + * Tg RA, 4* Syc + PR + Ep + Syc Performance evaluation is then one in by comparing our IPMN hanoff moel with the Mobile IP hanoff moel. In orer to o this we also moele Mobile IP hanoff latencies. Similar efforts have been realize in moeling Mobile IP s hanoff latency. MIP hanoff elay H is given by Equation (5) H = L + M + R + IT...5 Where L is the total Link Layer elay moele earlier. M is the Movement Detection elay cause by MIP consisting of the outgoing an incoming agents beacon timers. R an IT are the registration an tunneling elays respectively. Detaile escription on moeling of Mobile IP can be foun in the technical report[16]. 6 PERFORMANCE EVALUATION We have simulate the moels for IPMN an MIP. Since most of the elay for IPMN is the signaling costs an system calls, it incurre only a very little hanoff elay. Figure 5 shows the latencies of non-overlapping (right sie) an overlapping (left sie) cell bounaries. MIP1 an MIP are versions of MIP that use ifferent agent avertisement life times. MIP1 uses a life time of 1ms an MIP uses 1 sec. Hanoff elay for MIP1 an IPMN is in the orer of 1ms. Though MIP1 promises better performance, it actually egraes the performance ue to banwith monopolization. As evient in figure, MIP fails to eliver real-time voice Message Number Figure 6: Message arrival times in an ieal channel without BER an congestion. an vieo traffic. MIP an IPMN have the hanoff elay ifference up to secons. In eveloping the simulation we assume that each message is of size 1KB an the total transfer size is 3MB. We also assume the expecte packet inter arrival time of 8 ms as banwith consieration. We also scheule a hanoff every one minute an observe the packet arrival times. Figure 6 gives the ifference between IPMN an MIP message arrival times. MIP experiences a elay of aroun 1 secon at each hanoff while IPMN only has a elay of 7 millisecons. A wireless environment is prone to higher Bit Error Rates (BER) which can be even upto1% of the transmission rates. BER can be moele as a Log-Normal istribution [1]. We have also consiere elay ue to congestion in our moel. This was simulate ifferently for ifferent congestion constraints. Many factors such as BER in the physical layer, or cross traffic in the network layer, causes congestion. Congestion incurre ue to BER is inuce as an exponential istribution. Congestion cause ue to cross traffic is explaine in etail in later sections separately for various traffic patterns. Various traffic patterns was generate using the moels given by NetSpec [19]. We subtracte each packet s arrival time from its expecte arrival time. This woul be the elay ue to either BER, congestion, hanoff or a combination of these factors. To give a better unerstaning we have also plotte the Normal case (where there is no hanoff) along with the Mobile IP an IPMN cases. The elay in this normal case is only ue to BER an/or congestion. 6.1 Ftp Cross Traffic Figure 7 shows the performance analysis of MIP IPMN to that of Normal case. Here the congestion is generate ue to ftp transfers suenly initiate while the ata is being transferre to the MN. Ftp traffic an many other traffic patterns follow a two step moel. The first is the Packet inter arrival times or packet size calle Session Level. The other is the Session uration or Session interarrival time calle Call Level. We have use the traffic moeling of NetSpec [19] a traffic generator evelope by 6

7 Proceeings of the 5 IEEE International Conference on Electro Information Technology, 5, Lincoln Nebraska, May 5 University of Kansas. In Netspec Ftp follows an exponential istribution for Session inter-arrival times an a log-normal istribution for the item sizes in Session Level. We use these ensity functions to generate cross traffic by incorporating these elays in RTT measurements. We use λ =.5 for exponential istribution mean = 6 an stanar eviation = for Log-Normal istribution. The burst inicate in figure 7 is the elay cause in packet arrival times ue to ftp cross traffic. This has been inuce as congestion into the packet arrival times in all the three cases. As evient, in MIP this elay compouns whenever there is a hanoff. The hanoff in MIP causes congestion in higher layers an cumulatively worsens the packet arrival time. This is evient from the figure 7. After every hanoff there is an exponential increase of packet arrival times. This tens to be linear as the transmission progresses. Our metric was packet arrival times with respect to expecte packet arrival. MIP triggers TCP Time(secs) Message Arrival Times NO HANDOFF MIP IPMN burst Message Number Figure 7: Message arrival times 1% BER an congestion ue to ftp cross traffic. congestion control every time a hanoff is initiate. In contrast, IPMN oes not have this elay because of the explicit event notification an the persist timer. Overall MIP takes aroun 5 secons more than that of IPMN to complete the ata transfer. 6. Voice Cross Traffic Voice has a Constant Bit Rate (CBR) traffic characteristic an its typical sampling rate is 8 khz an each sample consisting of is 8 bits. This gives the stanar bit rate of 64 Kb/sec for acceptable voice quality. Call inter-arrival times are moele to be exponentially istribute. Figure 8 shows the performance when the congestion is ue to backgroun voice call. We have use λ =.333 an incorporate the congestion factor in packet arrival times. As observe in figure 8 MIP has lot of performance egraation ue to cross traffic. It also suffers a ripple effect an the packet arrival times ten to increase after every hanoff. Hanoff also has elay inuce as Figure 8: Message arrival times at MN with 1% BER an congestion ue to voice cross traffic. congestion into packet arrival times. The ifference in the packet arrival times of MIP an IPMN is almost 1 secons in this case which gives a clear inication of how MIP woul fail elivering voice traffic. IPMN on the other han has no congestion builup ue to hanoff. Compare to IPMN is again almost linear an smooth. MIP cannot hanle real time traffic like voice an vieo while IPMN elivers the same efficiently with very little or no quality egraation. 6.3 WWW Cross Traffic Interactive traffic has the ocument size as a Power Law or Pareto istribution which is heavy taile. The probability ensity function an cumulative istribution function of a Pareto istribution are given by eq 18. Since this is a heavy taile istribution WWW possesses self similarity in network traffic. Call Level of the WWW traffic has a mean request time of 5.75 an can be moele as a homogeneous Poisson istribution over one hour perio implying that the inter-request time is an exponential moel. We have generate the istribution using the probability ensity function an the value of α=.45. This elay was also introuce as congestion into the packet arrival times in between the ata transfer shown in figure 9 as burst. MIP has longer hanoff jumps an as a result Time(secs) MESSAGE ARRIVAL TIMES NO HANDOFF MIP IPMN burst burst Message Number Figure 9: Message arrival times at MN with 1% BER an congestion ue to WWW cross traffic. 7

8 Proceeings of the 5 IEEE International Conference on Electro Information Technology, 5, Lincoln Nebraska, May 5 introuces its own congestion along with the heavy taile nature of cross traffic. This leas to longer arrival times of packets an the elay creeps up as every hanoff will a more an more latency in packet arrival times into WWW interactive traffic. MIP takes 7 secons more than IPMN for the same ata transfer. 7 CONCLUSION In this paper we have presente an infrastructure-less high performance mobility protocol which uses explicit En-to-En notification mechanism to hanle mobility. This eliminate the istribute nature of MIP s movement etection an hence the nee for a preeploye infrastructure. Thus MIP requires new software at one en-point (MN), one new entity at MN s traitional base station from which it gets ientity (HA) an also a battery of network eploye entities (FA). Copies of FA have to be available ahea of time in all parts of the Internet where the mobile noe might move. In comparison, the IPMN oes not require HA, oes not require the battery of pre-eploye FAs. Instea it requires the sening en-point to be mobility aware. MIP oes not nee this. Naturally, there will be mobility scenarios where one will be more appropriate than the other. When both options are feasible it is worthwhile to consier the traeoff. Traeoff for IPMN is that it offers much greater performance on several counts. Besies, the ifference in eployment scenarios, the IPMN offers blazingly fast hanoff (base on local event) compare to MIP (base remote timer/beacon). It also uses simplifie routing. A packet is irectly route in both irections (oes not have to go through HA). We have foun that just the hop count is reuce approximately by half. There is also no tunneling (packing/unpacking) elay/jitter ae to packets. With the elimination of infrastructure it also rastically reuces the eployment an maintenance costs. The performance avantage is likely to make IPMN a caniate technology for connection oriente mobility. This is currently very ifficult on MIP. REFERENCES [1] Perkins C., IP Mobility Support, RFC, IETF, Oct [] Charles Perkins, Davi B. Johns Route Optimization in Mobile IP, IETF, February 1999 [3] Fikouras N. an Görg C., Performance Comparison of Hinte an Avertisement Base Movement Detection Methos for Mobile IP Han-offs, In Proc. of the European Wireless, Dresen, Germany, September. [4] Singh R., Tay Y., Teo W., an Yeow S., RAT: A Quick (An Dirty?) Push for Mobility Support, n IEEE Workshop on Mobile Comp. Systems an Applications, pp. 3, Feb [5] A. Bakre., an B.R. Barinath., Hanoff an system support for Inirect TCP/IP, Proc. Secon Usenix Symp. On Mobile an Location Inepenent Computing [6] Goff T., Moronski J., Phatak D., Gupta V., "Freeze- TCP: A True En-to-En TCP Enhancement Mechanism for Mobile Environments," INFOCOM', Tel-Aviv, Israel, pp ,. [7] Gustafsson E., et al. Mobile IPv4 Regional Registration raft-ietf-mobileip-reg-tunnel-5, IETF, September 1. [8] MALTZ D., AND BHAGWAT P., MSOCKS: An architecture for transport layer mobility. In Proc. IEEE Infocom 98, March [9] Bakre A., an Barinath B.R., I-TCP; Inirect TCP for Mobile Hosts, In Proc. Of 15 th International conference on Distribute Computing Systems, May [1] Khan J., Zaghal R., an Gu Q., Symbiotic Streaming of Elastic Traffic on Interactive Transport, IEEE ISCC'3, Antalya, Turkey, July 3. [11] Khan J. an Zaghal R., "Protocol Moeling with Transparent Networking", CCCT'4, Austin, TX, August 4. [1] Funato D., Yasua K., an Tokua H., TCP-R: TCP Mobility Support for Continuous Operation, Proc. International Conference on Network Protocols, [13] Mishra A., Shin M., Arbaugh W., An Empirical Analysis of the IEEE 8.11 MAC Layer Hanoff Process, Dept. of Computer Science, University of Marylan, technical report number CS-TR [14] Velayos H., Carlson G., Techniques to Reuce 8.11b MAC Layer Hanover, Technical Report, April 3 [15] Perkins C., Mobile IP, Design Principles an Practices, Aison Wesley, [16] Davu S., Hanoff Moel of Mobile IP, Technical Report, Kent State University, 5. [17] Postel J.B., Transmission Control Protocol, RFC 1793, September [18] Carvalho M., Aceves J., Delay Analysis of IEEE 8.11 in Single-Hop Networks, ICNP, November 3. [19] Lee B., Frost V., Wie Area ATM Network Experiments Using Emulate Traffic Sources,Technical Report, Jan [] Yokota H, et al., Link Layer Assiste Hanoff Metho over Wireless LAN Networks, Proc. of MOBICOM, Sept.. [1] Carvalho M., Aceves J., Delay Analysis of IEEE 8.11 in Single-Hop Networks, ICNP, November 3. 8

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

An Interactive Transparent Protocol for Connection Oriented Mobility Performance Analysis with Voice Traffic

An Interactive Transparent Protocol for Connection Oriented Mobility Performance Analysis with Voice Traffic An Interactive Transparent Protocol for Connection Oriented Mobility Performance Analysis with Voice Traffic Raid Y. Zaghal, Sandeep Davu and Javed I. Khan Networking and Media Communications Research

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,

More information

MODULE V. Internetworking: Concepts, Addressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, And End-To-End Services

MODULE V. Internetworking: Concepts, Addressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, And End-To-End Services MODULE V Internetworking: Concepts, Aressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, An En-To-En Services Computer Networks an Internets -- Moule 5 1 Spring, 2014 Copyright

More information

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun

More information

Overview : Computer Networking. IEEE MAC Protocol: CSMA/CA Internet mobility TCP over noisy links

Overview : Computer Networking. IEEE MAC Protocol: CSMA/CA Internet mobility TCP over noisy links Overview 15-441 15-441: Computer Networking 15-641 Lecture 24: Wireless Eric Anerson Fall 2014 www.cs.cmu.eu/~prs/15-441-f14 Internet mobility TCP over noisy links Link layer challenges an WiFi Cellular

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita

More information

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance International Journal of Moern Communication Technologies & Research (IJMCTR) Impact of FTP Application file size an TCP Variants on MANET Protocols Performance Abelmuti Ahme Abbasher Ali, Dr.Amin Babkir

More information

Topics. Computer Networks and Internets -- Module 5 2 Spring, Copyright All rights reserved.

Topics. Computer Networks and Internets -- Module 5 2 Spring, Copyright All rights reserved. Topics Internet concept an architecture Internet aressing Internet Protocol packets (atagrams) Datagram forwaring Aress resolution Error reporting mechanism Configuration Network aress translation Computer

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients Probabilistic Meium Access Control for 1 Full-Duplex Networks with Half-Duplex Clients arxiv:1608.08729v1 [cs.ni] 31 Aug 2016 Shih-Ying Chen, Ting-Feng Huang, Kate Ching-Ju Lin, Member, IEEE, Y.-W. Peter

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks Hinawi Publishing Corporation International Journal of Distribute Sensor Networks Volume 2014, Article ID 936379, 17 pages http://x.oi.org/10.1155/2014/936379 Research Article REALFLOW: Reliable Real-Time

More information

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques What is testing? ing is the process of emonstrating that errors are not present. The purpose

More information

MODULE VII. Emerging Technologies

MODULE VII. Emerging Technologies MODULE VII Emerging Technologies Computer Networks an Internets -- Moule 7 1 Spring, 2014 Copyright 2014. All rights reserve. Topics Software Define Networking The Internet Of Things Other trens in networking

More information

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

A Plane Tracker for AEC-automation Applications

A Plane Tracker for AEC-automation Applications A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)

More information

Supporting Fully Adaptive Routing in InfiniBand Networks

Supporting Fully Adaptive Routing in InfiniBand Networks XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

NAND flash memory is widely used as a storage

NAND flash memory is widely used as a storage 1 : Buffer-Aware Garbage Collection for Flash-Base Storage Systems Sungjin Lee, Dongkun Shin Member, IEEE, an Jihong Kim Member, IEEE Abstract NAND flash-base storage evice is becoming a viable storage

More information

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks Optimal Routing an Scheuling for Deterministic Delay Tolerant Networks Davi Hay Dipartimento i Elettronica olitecnico i Torino, Italy Email: hay@tlc.polito.it aolo Giaccone Dipartimento i Elettronica olitecnico

More information

Estimating Velocity Fields on a Freeway from Low Resolution Video

Estimating Velocity Fields on a Freeway from Low Resolution Video Estimating Velocity Fiels on a Freeway from Low Resolution Vieo Young Cho Department of Statistics University of California, Berkeley Berkeley, CA 94720-3860 Email: young@stat.berkeley.eu John Rice Department

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

ECS-087: Mobile Computing

ECS-087: Mobile Computing ECS-087: Mobile Computing TCP over wireless TCP and mobility Most of the Slides borrowed from Prof. Sridhar Iyer s lecture IIT Bombay Diwakar Yagyasen 1 Effect of Mobility on Protocol Stack Application:

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

On the Placement of Internet Taps in Wireless Neighborhood Networks

On the Placement of Internet Taps in Wireless Neighborhood Networks 1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Multicast Routing : Computer Networking. Example Applications. Overview

Multicast Routing : Computer Networking. Example Applications. Overview Multicast outing 5-744: Computer Networking Unicast: one source to one estination Multicast: one source to many estinations Two main functions: Efficient ata istribution Logical naming of a group L-0 Multicast

More information

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stolyar Abstract Backpressure-base aaptive routing

More information

ACE: And/Or-parallel Copying-based Execution of Logic Programs

ACE: And/Or-parallel Copying-based Execution of Logic Programs ACE: An/Or-parallel Copying-base Execution of Logic Programs Gopal GuptaJ Manuel Hermenegilo* Enrico PontelliJ an Vítor Santos Costa' Abstract In this paper we present a novel execution moel for parallel

More information

Enabling Rollback Support in IT Change Management Systems

Enabling Rollback Support in IT Change Management Systems Enabling Rollback Support in IT Change Management Systems Guilherme Sperb Machao, Fábio Fabian Daitx, Weverton Luis a Costa Coreiro, Cristiano Bonato Both, Luciano Paschoal Gaspary, Lisanro Zambeneetti

More information

Adjacency Matrix Based Full-Text Indexing Models

Adjacency Matrix Based Full-Text Indexing Models 1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,

More information

A Metric for Routing in Delay-Sensitive Wireless Sensor Networks

A Metric for Routing in Delay-Sensitive Wireless Sensor Networks A Metric for Routing in Delay-Sensitive Wireless Sensor Networks Zhen Jiang Jie Wu Risa Ito Dept. of Computer Sci. Dept. of Computer & Info. Sciences Dept. of Computer Sci. West Chester University Temple

More information

Inuence of Cross-Interferences on Blocked Loops: to know the precise gain brought by blocking. It is even dicult to determine for which problem

Inuence of Cross-Interferences on Blocked Loops: to know the precise gain brought by blocking. It is even dicult to determine for which problem Inuence of Cross-Interferences on Blocke Loops A Case Stuy with Matrix-Vector Multiply CHRISTINE FRICKER INRIA, France an OLIVIER TEMAM an WILLIAM JALBY University of Versailles, France State-of-the art

More information

Chapter 9 Memory Management

Chapter 9 Memory Management Contents 1. Introuction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threas 6. CPU Scheuling 7. Process Synchronization 8. Dealocks 9. Memory Management 10.Virtual Memory

More information

Top-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications

Top-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications Top-own Connectivity Policy Framework for Mobile Peer-to-Peer Applications Otso Kassinen Mika Ylianttila Junzhao Sun Jussi Ala-Kurikka MeiaTeam Department of Electrical an Information Engineering University

More information

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach Nishi Sharma, Vanna Verma Abstract Wireless sensor networks (WSNs) is one of the emerging fiel of research in recent era

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,

More information

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member

More information

WLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic

WLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic WLAN Inoor Positioning Base on Eucliean Distances an Fuzzy Logic Anreas TEUBER, Bern EISSFELLER Institute of Geoesy an Navigation, University FAF, Munich, Germany, e-mail: (anreas.teuber, bern.eissfeller)@unibw.e

More information

TCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model

TCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model TCP Symbiosis: Congestion Control Mechanisms of TCP base on Lotka-Volterra Competition Moel Go Hasegawa Cybermeia Center Osaka University 1-3, Machikaneyama-cho, Toyonaka, Osaka 56-43, JAPAN Email: hasegawa@cmc.osaka-u.ac.jp

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University

More information

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure

More information

Efficient Recovery from False State in Distributed Routing Algorithms

Efficient Recovery from False State in Distributed Routing Algorithms Efficient Recovery from False State in Distribute Routing Algorithms Daniel Gyllstrom, Suarshan Vasuevan, Jim Kurose, Gerome Milau Department of Computer Science University of Massachusetts Amherst {pg,

More information

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly

More information

CordEx. >> Operating instructions. English

CordEx. >> Operating instructions. English CorEx >> Operating instructions English Symbols use in this manual Important information concerning your safety is specifically marke. Follow these instructions closely to prevent accients an amage to

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stoylar arxiv:15.4984v1 [cs.ni] 27 May 21 Abstract

More information

Image Segmentation using K-means clustering and Thresholding

Image Segmentation using K-means clustering and Thresholding Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,

More information

Lab work #8. Congestion control

Lab work #8. Congestion control TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño

More information

Two Dimensional-IP Routing

Two Dimensional-IP Routing Two Dimensional-IP Routing Mingwei Xu Shu Yang Dan Wang Hong Kong Polytechnic University Jianping Wu Abstract Traitional IP networks use single-path routing, an make forwaring ecisions base on estination

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Depth Sizing of Surface Breaking Flaw on Its Open Side by Short Path of Diffraction Technique

Depth Sizing of Surface Breaking Flaw on Its Open Side by Short Path of Diffraction Technique 17th Worl Conference on Nonestructive Testing, 5-8 Oct 008, Shanghai, China Depth Sizing of Surface Breaking Flaw on Its Open Sie by Short Path of Diffraction Technique Hiroyuki FUKUTOMI, Shan LIN an Takashi

More information

Ad-Hoc Networks Beyond Unit Disk Graphs

Ad-Hoc Networks Beyond Unit Disk Graphs A-Hoc Networks Beyon Unit Disk Graphs Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich 8092 Zurich, Switzerlan {kuhn, wattenhofer, zollinger}@inf.ethz.ch ABSTRACT

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA Preprint, August 5, 2018. 1 All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA Mikhail Ivanov, Frerik Brännström, Alexanre Graell i Amat, an Petar Popovski Department of Signals an Systems,

More information

PAPER. 1. Introduction

PAPER. 1. Introduction IEICE TRANS. COMMUN., VOL. E9x-B, No.8 AUGUST 2010 PAPER Integrating Overlay Protocols for Proviing Autonomic Services in Mobile A-hoc Networks Panagiotis Gouvas, IEICE Stuent member, Anastasios Zafeiropoulos,,

More information

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms Overview Chapter 13 TRANSPORT Motivation Simple analysis Various TCP mechanisms Distributed Computing Group Mobile Computing Winter 2005 / 2006 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer

More information

Trailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks

Trailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks Trailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks Xinxin Liu, Han Zhao, Xin Yang Computer & Information Science & Eng. University of Floria Email:{xinxin,han,xin}@cise.ufl.eu

More information

Data Mining: Clustering

Data Mining: Clustering Bi-Clustering COMP 790-90 Seminar Spring 011 Data Mining: Clustering k t 1 K-means clustering minimizes Where ist ( x, c i t i c t ) ist ( x m j 1 ( x ij i, c c t ) tj ) Clustering by Pattern Similarity

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

6.823 Computer System Architecture. Problem Set #3 Spring 2002

6.823 Computer System Architecture. Problem Set #3 Spring 2002 6.823 Computer System Architecture Problem Set #3 Spring 2002 Stuents are strongly encourage to collaborate in groups of up to three people. A group shoul han in only one copy of the solution to the problem

More information

Analytical approximation of transient joint queue-length distributions of a finite capacity queueing network

Analytical approximation of transient joint queue-length distributions of a finite capacity queueing network Analytical approximation of transient joint queue-length istributions of a finite capacity queueing network Gunnar Flötterö Carolina Osorio March 29, 2013 Problem statements This work contributes to the

More information

Mobile Transport Layer

Mobile Transport Layer Mobile Transport Layer 1 Transport Layer HTTP (used by web services) typically uses TCP Reliable transport between TCP client and server required - Stream oriented, not transaction oriented - Network friendly:

More information

Mobile SCTP for IP Mobility Support in All-IP Networks

Mobile SCTP for IP Mobility Support in All-IP Networks Mobile SCTP for IP Mobility Support in All-IP Networks Seok Joo Koh sjkoh@cs.knu.ac.kr Abstract The Stream Control Transmission Protocol (SCTP) is a new transport protocol that is featured multi-streaming

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Outline 9.2. TCP for 2.5G/3G wireless

Outline 9.2. TCP for 2.5G/3G wireless Transport layer 9.1 Outline Motivation, TCP-mechanisms Classical approaches (Indirect TCP, Snooping TCP, Mobile TCP) PEPs in general Additional optimizations (Fast retransmit/recovery, Transmission freezing,

More information

TCP Timeout Mechanism for Optimization of Network Fairness and Performance in Multi-Hop Pipeline Network

TCP Timeout Mechanism for Optimization of Network Fairness and Performance in Multi-Hop Pipeline Network Draft Version - Brunel University, Lonon TCP Timeout Mechanism for Optimization of Network Fairness an Performance in Multi-Hop Pipeline Network Siva Kumar Subramaniam 1, Rajagopal Nilavalan 3, Wamaeva

More information

Overlap Interval Partition Join

Overlap Interval Partition Join Overlap Interval Partition Join Anton Dignös Department of Computer Science University of Zürich, Switzerlan aignoes@ifi.uzh.ch Michael H. Böhlen Department of Computer Science University of Zürich, Switzerlan

More information

On the Feasibility and Efficacy of Protection Routing in IP Networks

On the Feasibility and Efficacy of Protection Routing in IP Networks University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering 2-0-2009 On the Feasibility an Efficacy of Protection Routing in IP Networks Kin-Wah

More information

Cascading Multi-Hop Reservation and Transmission in Underwater Acoustic Sensor Networks

Cascading Multi-Hop Reservation and Transmission in Underwater Acoustic Sensor Networks Sensors 2014, 14, 18390-18409; oi:10.3390/s141018390 Article OPEN ACCESS sensors ISSN 1424-8220 www.mpi.com/journal/sensors Cascaing Multi-Hop Reservation an Transmission in Unerwater Acoustic Sensor Networks

More information

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter FDL sel. VOA SOA 100 Regular papers ONDM 2018 Scalable Deterministic Scheuling for WDM Slot Switching Xhaul with Zero-Jitter Bogan Uscumlic 1, Dominique Chiaroni 1, Brice Leclerc 1, Thierry Zami 2, Annie

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany Mobile Communications Chapter 9: Mobile Transport Layer Motivation, TCP-mechanisms Classical approaches (Indirect

More information

A Framework for Dialogue Detection in Movies

A Framework for Dialogue Detection in Movies A Framework for Dialogue Detection in Movies Margarita Kotti, Constantine Kotropoulos, Bartosz Ziólko, Ioannis Pitas, an Vassiliki Moschou Department of Informatics, Aristotle University of Thessaloniki

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 0 0 0 0 0 0 0 0 on-uniform Sensor Deployment in Mobile Wireless Sensor etworks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University Boca Raton,

More information

CIS 632 / EEC 687 Mobile Computing

CIS 632 / EEC 687 Mobile Computing CIS 632 / EEC 687 Mobile Computing TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple

More information

Network Address Translation (NAT)

Network Address Translation (NAT) Network Aress Translation (NAT) NAT Motivation IPv4 was running out of aresses ISPs only want to limit a customer to one IP aress at any time, but customers want multiple evices to be online Engineers

More information

A SWARM INSPIRED MULTIPATH DATA TRANSMISSION WITH CONGESTION CONTROL IN MANETS USING PROBABILISTIC APPROACH

A SWARM INSPIRED MULTIPATH DATA TRANSMISSION WITH CONGESTION CONTROL IN MANETS USING PROBABILISTIC APPROACH A SWARM INSPIRED MULTIPATH DATA TRANSMISSION WITH CONGESTION CONTROL IN MANETS USING PROBABILISTIC APPROACH Subhankar oarar 1, Vanana Bhattacheree 2 an Debasis Giri 1 1 Department of Computer Science an

More information

Improving Performance of Sparse Matrix-Vector Multiplication

Improving Performance of Sparse Matrix-Vector Multiplication Improving Performance of Sparse Matrix-Vector Multiplication Ali Pınar Michael T. Heath Department of Computer Science an Center of Simulation of Avance Rockets University of Illinois at Urbana-Champaign

More information