Disjoint Multipath Routing in Dual Homing Networks using Colored Trees

Size: px
Start display at page:

Download "Disjoint Multipath Routing in Dual Homing Networks using Colored Trees"

Transcription

1 Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona, Tucson, AZ 2 {pthulasi, srini, krunz}@ece.arizona.eu Abstract Wireless sensor networks (WSNs) employe in monitoring applications require ata collecte by the sensors to be eposite at specific noes, referre to as rains. To improve robustness in ata collection, we consier a ual homing network in which two rains are employe an every noe is require to sen ata to the two rains over link- or noe-isjoint paths. One approach to reuce the number of routing table entries at a noe is to construct two trees, namely re an blue, each roote at a particular rain such that the paths from any noe to the two rains on the trees are link- or noe-isjoint. In this paper, we evelop the first istribute algorithm for constructing colore trees in a ual-homing network whose running time is linear in the number of links. In aition, we show that the average path length may be optimize by employing the generalize low-point concept rather than the traitional low-point concept. I. INTRODUCTION Recent avancements in low-power computing, sensing, an wireless communications have contribute to the emergence of multi-hop wireless sensor networks (WSNs) as a costeffective solution for surveillance/monitoring applications. The ata collecte by sensors in a WSN is require to be eposite at specific noes, referre to as rains. In orer to improve robustness in ata collection, we consier a scenario where two rains are employe an ata from every sensor is require to be eposite at both the rains. As the sensor noes have limite battery energy an computational capabilities, implementation of sophisticate transport layer protocols that guarantee en-to-en reliable transmission is impractical. One approach to achieve the goal of robustness is to employ multipath routing (MPR). MPR operates by transmitting ata over multiple paths. In general, the multiple paths from a source to a estination may have common links (or noes) as long as the share links (or noes) have sufficient resources. To improve the transmission reliability an avoi share-link (or noe) failures, the multiple paths can be selecte to be linkor noe-isjoint. In this case, the MPR approach is referre to as isjoint multipath routing (DMPR). Implementation of MPR an DMPR poses two main challenges []. The first is relate to the computation of loopfree multiple paths. For large networks, a istribute solution that relies only on local information is preferre. Distribute multipath routing algorithms in the literature are evelope in the context of wireless networks. MPR approaches base on Dynamic Source Routing (DSR) [2], [], [] require the estination to select maximally isjoint paths among the receive route requests. MPR approaches base on AODV routing [], [], [], [], [] o not guarantee fining isjoint paths. Protocols such as Directe Diffusion [] that have been evelope specifically for wireless sensor networks o not guarantee isjoint multiple paths an may result in loops after a link/noe failure. The secon challenge of implementing MPR or DMPR techniques is relate to forwaring of ata over the multiple paths. Datagram networks rely on the estination aress in the packet heaer for forwaring packets over one path. To implement MPR or DMPR techniques, every noe must maintain a set of preferre neighbors to reach a estination, such that the paths are loop-free (an isjoint, if neee). The forwaring of packets must be base on estination aress an some aitional information (such as source aress, labels, etc.). The intermeiate noes must be aware of this aitional information or otherwise, it must be carrie in every packet heaer. To reuce the routing table overhea, hence reuce lookup time, a novel multipath routing strategy calle colore trees (CT) was evelope []. Every noe in the network has two preferre neighbors to a estination, namely re an blue. A packet transmitte from a source is marke with one of the two colors. An intermeiate noe that receives the packet forwars it to its preferre neighbor base on the color of the packet. Thus, the routing table at a noe has only two entries for every estination noe. The network may be viewe as two trees, namely re an blue, that are roote at the estination. The two paths from a given source to the root of the two trees are link/noe-isjoint. The colore trees may be constructe by aapting the centralize algorithms evelope for robust multicasting [], [], [], by simply reversing the arcs obtaine in the multicast trees. The first istribute algorithm for constructing colore trees, whose complexity is linear in the number of eges, was evelope in []. A ual homing network (DHN) is traitionally employe in IP-base access networks []. A DHN consists of two eicate routers, referre to as ual homes, through which the noes within the access network are connecte to those outsie the access network. A sensor network with two rains may be viewe as a DHN where the two rains act as the two homes. In orer to overcome a single link (or noe) failure within the network, every noe is require to have a path to the two homes that are link-isjoint (or noe-isjoint). In orer to

2 maintain isjoint routes with minimum routing table overhea, thereby reucing routing table lookup time, we evelop the colore trees to ual homes (CTDH). In this approach, the re tree is roote at one home while the blue tree is roote at the other such that the path from any source to the two homes on the two trees are link-isjoint (or noe-isjoint). Figure shows two trees, one roote at noe an the other roote at, in a ual-homing network with noes an as the ual homes. It may be observe that the paths from any noe to the ual homes on the two trees are noe-isjoint. (a) Re tree roote at. (b) Blue tree roote at. Fig.. An example network with re an blue trees. The path from a source to the two homes (rains) are noe-isjoint on the two trees. Contribution. This paper () proves that 2-ege (or 2- noe) connectivity is a sufficient conition for the existence of a solution to the CTDH problem satisfying link-isjoint (or noe-isjoint) constraint; (2) evelops a istribute solution to the CTDH problem whose complexity is linear in the number of eges; () evaluates the effectiveness of employing generalize low-point concept compare to traitional lowpoint concept; an () evaluates the effectiveness of the trees constructe uner multiple link failures. The rest of the paper is organize as follows: Section II escribes the network moel an problem efinition. Section III evelops the linear-time istribute algorithm for constructing the two colore trees. Section IV presents the performance comparison of the istribute algorithm with traitional an generalize low-point concepts. Our conclusions are presente in Section V. II. PROBLEM STATEMENT AND PRELIMINARIES Consier a network G(N, L) compose of a set of noes N an a set of links L. The links are assume to be bi-irectional. The terminology of arc is use to refer to a irecte link between two noes. An arc from noe i to j is represente as i j. Given ual homes, N, the goal is to construct two trees R an B (referre to as the re an blue trees, respectively) roote at an, respectively, that minimize the average path length from a source to the homes such that the CTDH-LD (CTDH-ND) version of the problem satisfies the link-isjoint (noe-isjoint) path constraint. The isjoint path constraints are state as follows. Let P R s an P B s enote the paths from a noe s to rains an on trees R an B, respectively. Link-isjoint path constraint: s N \ {, } an i, j N i j P R s (i j / P B s ) (j i / P B s ). Noe-isjoint path constraint: s N \ {, } an i N \ {s, } i P R s (i / P B s ). If the two homes are the same, say = =, then we refer to the problem of constructing colore trees roote at a given estination such that the path from any noe to the estination is link-isjoint (noe-isjoint) as the CT-LD (CT-ND) problem. Theorem: A solution to the CTDH-LD (CTDH-ND) problem exists if the network is 2-ege (2-noe) connecte. Proof: Construct a graph G from G with an aitional noe an two biirectional links (, ) an (, ). The graph G remains 2-ege (2-noe) connecte if the graph G is 2-ege (2-noe) connecte. Since G is 2-ege (2-noe) connecte, a solution to the CT-LD (CT-ND) problem exists [] with noe as the estination. As noe has only two links, all the paths on one tree must traverse noe an link as the last noe an link, respectively. Similarly, all the paths on the other tree must traverse noe an link. Removing noe an the links attache to it results in a solution to the CTDH-LD (CTDH-ND) problem, thus proves the theorem. The CTDH-LD (CTDH-ND) problems may be formulate as an integer linear program (ILP) by extening the formulation of the CT-LD (CT-ND) problem evelope in []. The ILP formulation is omitte in this paper ue to space constraints, while the results obtaine from it are use to evaluate the performance of the istribute algorithm evelope here. A. Generalize low-point concept The istribute algorithm for the construction of colore trees to ual homes operates in two phases. The first phase involves istribute epth first search (DFS) numbering of the noes an computing the generalize low point values, istances, an neighbors. The secon phase involves istribute path augmentation for computing the two trees. The DFS numbering an low-point computation helps in ientifying paths for augmentation (uring the secon phase) without backtracking. In orer to reuce the average path length, we employ the generalize low point concept evelope in []. Consier a network in which the noes are numbere in the DFS orer. The low-point value of a noe n is traitionally efine as the lowest DFS-inex of a noe that can be reache from n by using DFS-tree eges an at most one back ege. The low-point path of noe n is the path traverse to reach the low-point noe. The low-point path of a noe n is of the form n i i 2... i k n (k 0) such that: () noe n is the DFS-parent of noe i, (2) noe i j is the DFS-parent A DFS-tree is a tree roote at the rain an the arcs in the tree are irecte away from the rain. A back ege is an ege that connects a higher DFSinex noe to a lower DFS-inex noe. The low-point noe of a noe n is the noe whose DFS-number is the LPV of noe n.

3 of noe i j (2 j k), () the DFS-inex of n is lower than that of n; an () the DFS-inex of n is the lowest among all such possible paths. The algorithm evelope in [] employs the traitional low-point value an path. The generalize low-point value (GLPV) of a noe n is efine as the lowest DFS-inex of a noe that can be reache from noe n by traversing a sequence of noes with increasing DFS-inex with the exception of the last hop. The generalize low-point path of a noe n is of the form n i i 2... i k n (k 0), such that: () the DFS-inex of n is lower than that of i, (2) the DFS-inex of i j is lower than that of i j (2 j k), () the DFS-inex of noe n is lower than that of noe n, an () the DFS-inex of n is the lowest among all such possible paths. The generalize lowpoint neighbor (GLPN) of a noe n is efine as that neighbor of noe n which is on its generalize low-point path. III. LINEAR TIME DISTRIBUTED CONSTRUCTION OF COLORED TREES TO DUAL HOMES The implementation of the istribute algorithm for the CTDH problem is base on the proof of existence of a solution escribe in Section II. Assume that we have the graph G obtaine from the given network G with an aitional noe an two biirectional links (, ) an (, ). We may employ the istribute algorithm evelope for the CT-LD an CT-ND problems with noe acting as the estination, except that noe is a virtual noe. A. Distribute DFS numbering Assume that the noes in G are numbere in the DFS orer starting from noe. The DFS-inex of noe is an without loss of generality, assume that the DFS-inex of is 2. In aition, the (generalize) low-point value of woul be an the (generalize) low-point path shoul traverse noe. As noe oes not exist in the given network, we initialize the DFS-inex of to, the DFS-inex of to 2, an allow to start the DFS numbering phase. The GLPV an GLPN of a noe are compute uring the istribute DFS numbering phase. The algorithm to assign the DFS-inices an compute the GLPV an GLPN is shown in Figure 2. The DFS-inices of all the noes are first initialize to -. We incorporate hop count as a metric to compute the shortest generalize low-point path among those available. Note that the linear-time algorithm evelope in this paper will work with the traitional low-point of a noe, however, the path length optimization cannot be mae as the arcs are force to be on the DFS-tree, except the last hop. The noe numbers in the example network shown in Figure inicate the DFS-inices of the noes when numbere from. The generalize low-point values, istances, neighbors of the noes are shown in Table I. B. Distribute path augmentation The istribute path augmentation is base on the generalize path augmentation technique evelope in []. A generalize version of the same is evelope in [], referre Notation Comment fs[n] DFS-inex of noe n. fsparent[n] DFS-parent of noe n. glpv[n] Generalize low-point value of noe n. glpn[n] Generalize low-point neighbor of noe n. glp[n] Generalize low-point istance of noe n. DFS(parent, n, currfs). if fs[n] > 0 return currfs; 2. fs[n] = currfs; fsparent[n] = parent; currfs = currfs + ;. for every neighbor i parent of n o:.a. currfs = DFS(n, i, currfs);.b. if (fs[i] < fs[n]) an (fs[i] glpv[n]).b.i. glpv[n] = fs[i]; glpn[n] = i; glp[n] = ;.C. else if (fs[i] > fs[n]) an (glpv[i] < glpv[n]).c.i. glpv[n] = glpv[i]; glpn[n] = i;.d. glp[n] = glp[i] + ; else if (fs[i] > fs[n]) an (glpv[i] = glpv[n]) an (glp[i] < glp[n] ).D.i. glpn[n] = i; glp[n] = glp[i] + ;. return currfs; Fig. 2. Algorithm to assign DFS-inices to the noes an compute generalize low-point value an neighbor of a noe. TABLE I GLPV, GLPN, AND GLPD VALUES OF THE NODES IN THE EXAMPLE NETWORK. n glpv(n) glpn(n) glp(n) n glpv(n) glpn(n) glp(n) 2 2 to as the XCT algorithm. The XCT algorithm for the CT-ND or CT-LD problem starts by choosing an arbitrary cycle, (, v,..., v k, ), consisting of at least three noes (k 2). The cycle in one irection is ae to the re tree an the cycle in the other irection is ae to the blue tree. If this cycle oes not contain all of the noes of G, then a subsequent path that starts an ens on that cycle an also passes through at least one noe not on the cycle is chosen for augmentation. The algorithm continues in this manner until all noes have been inclue for augmentation. In orer to ensure link-(or noe-)isjoint path constraints, a partial orering among the noes nees to be maintaine. Due to space constraints, we omit the etails on the partial orering an refer the reaers to [] for an elaborate iscussion. The istribute algorithm evelope in [] implements partial orering by maintaining only local (neighborhoo) information. The overview of the path augmentation process is shown in Figure. For the CTDH problem, the home with DFSinex of 2 initiates the path augmentation proceure. The path search message, SEARCH, receive by a noe, is forware to

4 its neighbor base on the forwaring rules escribe in []. The forwaring rules guarantee that the paths are augmente without backtracking, resulting in a linear time algorithm. The neighbors of a noe are arrange in the increasing orer of their DFS-inices in the neighbor list. Such an arrangement ensures that whenever a path search is initiate from the secon home (noe with DFS-inex 2) through its chil, it follows the low-point path, hence resulting in a path to the primary home. Thus, the key ifference between the working of the algorithm for the CTDH problem from that of the CT problem for one estination, is that the former fins a path between the two homes while the latter fins a cycle. The arrangement guarantees that the paths from any noe to a home will not inclue the other home, unless the other home is an articulation noe 2. Distribute Path Augmentation Algorithm ) Arrange the neighbors in the neighbor list in an increasing orer of their DFS inices. 2) On receiving a TOKEN message, initiate path search along every noe in the neighbor list, one at a time. ) Every noe that receives the SEARCH message forwars it sequentially to every noe in the neighbor list accoring to some forwaring rules. If a new path was augmente through a neighbor, then a flag is set corresponing to that noe. ) Forwar the TOKEN message to every noe if the flag is set for that noe. The neighbor list is traverse in the reverse irection. Every noe finishes its operation an sens a RETURN message back. ) After receiving a RETURN message from all the neighbors to whom the token message was sent, sen RETURN message to the noe that sent the TOKEN message. Fig.. Overview of the steps involve in the istribute algorithm for computing colore trees. We illustrate the working of the algorithm with the example network shown in Figure. Step. Noe 2 starts the path search through noe. Base on the forwaring rules [], the message traverses the generalize low point path until it reaches noe. Noe, being a home, is assume to be a part of the trees, hence sens a SUCCESS message in the reverse irection that the search messages were receive. The links that are ae to the blue tree are shown in Figure (a). Step 2. Noe 2 then initiates a path search through noe. The message traverses the generalize low point path. Figure (b) shows the path ae to the blue tree after this augmentation. Step. Now that noe 2 has attempte to augment paths through all its neighbors, the TOKEN will be sent to noe. Noe attempts the path through noe. The path obtaine is. Figure (c) shows the path ae to the blue tree 2 An articulation noe is one which isconnects the network upon its removal. after this step. Step. Noe passes the token to noe which initiates a search through. The path traverse by the message is. Figure () shows the path ae to the blue tree. The blue an re trees that are generate through this process are shown in Figures () an (e), respectively. IV. PERFORMANCE EVALUATION The linear time istribute algorithm evelope in this paper is evaluate on ranom topologies with 0, 0, 200, an 00 noes. The topologies were constructe using Waxman s moel []. As the solution time of the ILP is prohibitively high for large networks, we compare the results of the istribute algorithm to that of the optimal value for one network topology for each network size. Table II shows the comparison of results obtaine from the istribute algorithm employing traitional low point (TLP) an generalize low point (GLP) concepts to the optimal solution obtaine by solving the ILP (using CPLEX.0 solver []). It is observe that the results obtaine by employing GLP are closer to the optimal than those obtaine by employing TLP. In aition, we observe that the average path length obtaine using GLP is at most % away from the optimal. TABLE II COMPARISON OF RESULTS FROM THE DISTRIBUTED ALGORITHM EMPLOYING TLP AND GLP CONCEPTS TO THE OPTIMAL SOLUTION. Noes Links Average Re Path Length Average Blue Path Length TLP GLP Optimal TLP GLP Optimal For each network size, twenty ifferent topologies with two rains were simulate an the average results are shown in Table III for the CTDH-ND case. It is observe that a significant reuction in the average path lengths is obtaine by employing the generalize low-point concept, which reuces the hop-count on the low-point path. Similar results were obtaine for the CTDH-LD case an are not shown here ue to space constraints. TABLE III COMPARISON OF RESULTS OBTAINED IN RANDOM NETWORK TOPOLOGIES Noes Average of Links USING THE DISTRIBUTED ALGORITHM. Average Re Path Length Average Blue Path Length Average Total Path Length TLP GLP TLP GLP TLP GLP Average Reuction % % % % We evaluate the robustness of the trees constructe using the istribute algorithm uner multiple link failures. Let H an H 2 enote the hop length of the two paths from a noe to

5 (a) (b) (c) () (e) Fig.. An example illustrating the stages of the istribute path augmentation technique. the homes. Given that k links have faile in the network, the probability that both the paths of a noe are affecte, enote by P (H, H 2, k), is given by: P (H, H 2, k) = min(h,k ) i= min(h 2,k ) j= ( H )( H2 i ( L k) )( L H H 2 j k i j The sum of the above probability for all the noes gives the average number of noes that will lose both the paths to the homes uner k-link failures. Table IV shows the average number of noes isconnecte from both the rains for arbitrary two an three link failures. It is observe that employing GLP reuces the number of noes isconnecte from both the homes in the network in comparison to employing TLP. TABLE IV AVERAGE NUMBER OF NODES DISCONNECTED FROM BOTH THE DRAINS of Noes FOR ARBITRARY TWO AND THREE LINK FAILURES. of Links Average of Noes Average of Noes Disconnecte for k=2 Disconnecte for k= TLP GLP TLP GLP V. CONCLUSION This paper evelops a linear-time istribute algorithm for the construction of colore trees in a wireless sensor network employing two rains by moeling the network as a ualhoming network. By allowing the two rains to be roots of the trees, the network is resilient to a single rain failure. This paper also shows that employing the generalize low point (GLP) concept in a DFS tree allows for significant average path length reuction than the traitional low point (TLP) concept. In aition, using GLP rather than TLP allows a network to have greater tolerance for k link failures in terms of the number of noes isconnecte from both the homes. ACKNOWLEDGMENT The research evelope in this paper is supporte by National Science Founation uner grants 02, 00, an EEC-00. ) REFERENCES [] S. Ramasubramanian, M. Harkara, an M. Krunz, Distribute linear time construction of colore trees for isjoint multipath routing, in Proceeings of IFIP Networking, Coimbra, Portugal, May 200, pp. 2. [2] S. Lee an M. Gerla, Split multipath routing with maximally isjoint paths in a hoc networks, in Proceeings of IEEE ICC, 200, pp [] A. Nasipuri an S. R. Das, On-eman multipath routing for mobile a hoc networks, in Proceeings of IEEE International Conference on Computer Communications an Networks, October, pp. 0. [] J. Wu, An extene ynamic source routing scheme in a hoc wireless networks, in Proceeings of th Annual Hawaii International Conference on System Sciences, January 2002, pp. 2. [] M. K. Marina an S. R. Das, On-eman multipath istance vector routing in a hoc networks, in Proceeings of IEEE ICNP, November 200, pp. 2. [] V. D. Park an M. S. Corson, A highly aaptive istribute routing algorithm for mobile wireless networks, in Proceeings of IEEE INFOCOM, April, pp.. [] J. Raju an J. J. Garcia-Luna-Aceves, A new approach to on-eman loop-free multipath routing, in Proceeings of IEEE International Conference on Computer Communications an Networks (ICCCN), October, pp [] A. Valera, W. K. G. Seah, an S. V. Rao, Cooperative packet caching an shortest multipath in mobile ahoc networks, in Proceeings of IEEE INFOCOM, March-April 200, pp [] S. Lee an M. Gerla, AODV-BR: Backup routing in a hoc network, in Proceeings of IEEE WCNC, September 2000, pp.. [] C. Intanagonwiwat, R. Govinan, an D. Estrin, Directe iffusion: A scalable an robust communication paraigm for sensor networks, in Mobile Computing an Networking, August 2000, pp.. [] S. Ramasubramanian, H. Krishnamoorthy, an M. Krunz, Disjoint multipath routing using colore trees, Technical Report, University of Arizona, November 200. [] M. Mear, R.A. Barry, S.G. Finn, an R.G. Gallager, Reunant trees for preplanne recovery in arrbitrary vertex- reunant or ege reunant graphs, IEEE/ACM Transactions on Networking, vol., no., pp. 2, October. [] G. Xue, L. Chen, an K. Thulasiraman, Quality-of-service an qualityof-protection issues in preplanne recovery schemes using reunanttrees, IEEE Journal on Selecte Areas in Communication, vol. 2, no., pp. 2, October 200. [] W. Zhang, G. Xue, J. Tang, an K. Thulasiraman, Linear time construction of reunant trees for recovery schemes enhancing QoP an QoS, in Proceeings of IEEE INFOCOM, Miami, FL, USA, March 200, pp [] J. Wang, V.M. Vokkarane, R. Jothi, X. Qi, B. Raghavachari, an J.P. Jue, Dual homing protection in IP-over-WDM networks, Journal of Lightwave Technology, vol. 2, no., pp., 200. [] B. M. Waxman, Routing of multipoint connections, IEEE Journal of Selecte Areas in Communications, vol., no., pp. 22, December. [] CPLEX Solver,

Distributed Linear Time Construction of Colored Trees for Disjoint Multipath Routing

Distributed Linear Time Construction of Colored Trees for Disjoint Multipath Routing Distributed Linear Time Construction of Colored Trees for Disjoint Multipath Routing Srinivasan Ramasubramanian, Mithun Harkara, and Marwan Krunz Department of Electrical and Computer Engineering University

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance International Journal of Moern Communication Technologies & Research (IJMCTR) Impact of FTP Application file size an TCP Variants on MANET Protocols Performance Abelmuti Ahme Abbasher Ali, Dr.Amin Babkir

More information

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM International Journal of Physics an Mathematical Sciences ISSN: 2277-2111 (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

One-to-Many Multicast Restoration Based on Dynamic Core-Based Selection Algorithm in WDM Mesh Networks

One-to-Many Multicast Restoration Based on Dynamic Core-Based Selection Algorithm in WDM Mesh Networks Proceeings of the International MultiConference of Engineers an Computer Scientists 9 Vol I IMECS 9, March 18 -, 9, Hong Kong One-to-Many Multicast Restoration Base on Dynamic Core-Base Selection Algorithm

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks Hinawi Publishing Corporation International Journal of Distribute Sensor Networks Volume 2014, Article ID 936379, 17 pages http://x.oi.org/10.1155/2014/936379 Research Article REALFLOW: Reliable Real-Time

More information

PAPER. 1. Introduction

PAPER. 1. Introduction IEICE TRANS. COMMUN., VOL. E9x-B, No.8 AUGUST 2010 PAPER Integrating Overlay Protocols for Proviing Autonomic Services in Mobile A-hoc Networks Panagiotis Gouvas, IEICE Stuent member, Anastasios Zafeiropoulos,,

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach Nishi Sharma, Vanna Verma Abstract Wireless sensor networks (WSNs) is one of the emerging fiel of research in recent era

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,

More information

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks Provisioning Virtualize Clou Services in IP/MPLS-over-EON Networks Pan Yi an Byrav Ramamurthy Department of Computer Science an Engineering, University of Nebraska-Lincoln Lincoln, Nebraska 68588 USA Email:

More information

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpenCourseWare http://ocw.mit.eu 6.854J / 18.415J Avance Algorithms Fall 2008 For inormation about citing these materials or our Terms o Use, visit: http://ocw.mit.eu/terms. 18.415/6.854 Avance Algorithms

More information

On the Placement of Internet Taps in Wireless Neighborhood Networks

On the Placement of Internet Taps in Wireless Neighborhood Networks 1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that

More information

Uninformed search methods

Uninformed search methods CS 1571 Introuction to AI Lecture 4 Uninforme search methos Milos Hauskrecht milos@cs.pitt.eu 539 Sennott Square Announcements Homework assignment 1 is out Due on Thursay, September 11, 014 before the

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie

More information

Lab work #8. Congestion control

Lab work #8. Congestion control TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño

More information

Efficient Recovery from False State in Distributed Routing Algorithms

Efficient Recovery from False State in Distributed Routing Algorithms Efficient Recovery from False State in Distribute Routing Algorithms Daniel Gyllstrom, Suarshan Vasuevan, Jim Kurose, Gerome Milau Department of Computer Science University of Massachusetts Amherst {pg,

More information

Optimal Oblivious Path Selection on the Mesh

Optimal Oblivious Path Selection on the Mesh Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract

More information

MODULE VII. Emerging Technologies

MODULE VII. Emerging Technologies MODULE VII Emerging Technologies Computer Networks an Internets -- Moule 7 1 Spring, 2014 Copyright 2014. All rights reserve. Topics Software Define Networking The Internet Of Things Other trens in networking

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stolyar Abstract Backpressure-base aaptive routing

More information

Ad-Hoc Networks Beyond Unit Disk Graphs

Ad-Hoc Networks Beyond Unit Disk Graphs A-Hoc Networks Beyon Unit Disk Graphs Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich 8092 Zurich, Switzerlan {kuhn, wattenhofer, zollinger}@inf.ethz.ch ABSTRACT

More information

UC Santa Cruz UC Santa Cruz Previously Published Works

UC Santa Cruz UC Santa Cruz Previously Published Works UC Santa Cruz UC Santa Cruz Previously Publishe Works Title Towars Loop-Free Forwaring of Anonymous Internet Datagrams that Enforce Provenance Permalink https://escholarship.org/uc/item/5376h1mm Author

More information

Two Dimensional-IP Routing

Two Dimensional-IP Routing Two Dimensional-IP Routing Mingwei Xu Shu Yang Dan Wang Hong Kong Polytechnic University Jianping Wu Abstract Traitional IP networks use single-path routing, an make forwaring ecisions base on estination

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

d 3 d 4 d d d d d d d d d d d 1 d d d d d d

d 3 d 4 d d d d d d d d d d d 1 d d d d d d Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching

More information

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita

More information

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks Optimal Routing an Scheuling for Deterministic Delay Tolerant Networks Davi Hay Dipartimento i Elettronica olitecnico i Torino, Italy Email: hay@tlc.polito.it aolo Giaccone Dipartimento i Elettronica olitecnico

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

A Metric for Routing in Delay-Sensitive Wireless Sensor Networks

A Metric for Routing in Delay-Sensitive Wireless Sensor Networks A Metric for Routing in Delay-Sensitive Wireless Sensor Networks Zhen Jiang Jie Wu Risa Ito Dept. of Computer Sci. Dept. of Computer & Info. Sciences Dept. of Computer Sci. West Chester University Temple

More information

Supporting Fully Adaptive Routing in InfiniBand Networks

Supporting Fully Adaptive Routing in InfiniBand Networks XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

AODV Multipath Extension using Source Route Lists with Optimized Route Establishment

AODV Multipath Extension using Source Route Lists with Optimized Route Establishment INTERNATIONAL WORKHOP ON WIRELE A-HOC NETWORK (IWWAN) AOV Multipath Extension using ource Route Lists with Optimized Route Establishment Yusuke akurai and Jiro Katto Graduate chool of cience and Engineering,

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks Tejomayee Nath #1 & Suneeta Mohanty *2 # School of Computer Engineering, KIIT University Bhubaneswar,, India Abstract

More information

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly

More information

Pairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11:

Pairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11: airwise alignment using shortest path algorithms, Gunnar Klau, November 9,, : 3 3 airwise alignment using shortest path algorithms e will iscuss: it graph Dijkstra s algorithm algorithm (GDU) 3. References

More information

Dual Arm Robot Research Report

Dual Arm Robot Research Report Dual Arm Robot Research Report Analytical Inverse Kinematics Solution for Moularize Dual-Arm Robot With offset at shouler an wrist Motivation an Abstract Generally, an inustrial manipulator such as PUMA

More information

Bootstrapping Chord over MANETs - All Roads Lead to Rome

Bootstrapping Chord over MANETs - All Roads Lead to Rome Bootstrapping Chor over MANETs - All Roas Lea to Rome Wei Ding, Member, IEEE, S. S. Iyengar, Fellow, IEEE Abstract This paper presents a novel approach on bootstrapping Chor over mobile a hoc networs (MANETs).

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stoylar arxiv:15.4984v1 [cs.ni] 27 May 21 Abstract

More information

Design Principles for Practical Self-Routing Nonblocking Switching Networks with O(N log N) Bit-Complexity

Design Principles for Practical Self-Routing Nonblocking Switching Networks with O(N log N) Bit-Complexity IEEE TRANSACTIONS ON COMPUTERS, VOL. 46, NO. 10, OCTOBER 1997 1 Design Principles for Practical Self-Routing Nonblocking Switching Networks with O(N log N) Bit-Complexity Te H. Szymanski, Member, IEEE

More information

A Hybrid Routing Algorithm for Delay Tolerant Networks

A Hybrid Routing Algorithm for Delay Tolerant Networks Sensors & Transucers 2013 by IFSA http://www.sensorsportal.com A Hybri Routing Algorithm for Delay Tolerant Networs Jianbo LI, Jixing XU, Lei YOU, Chenqu DAI, Jieheng WU Information Engineering College

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Optimal Distributed P2P Streaming under Node Degree Bounds

Optimal Distributed P2P Streaming under Node Degree Bounds Optimal Distribute P2P Streaming uner Noe Degree Bouns Shaoquan Zhang, Ziyu Shao, Minghua Chen, an Libin Jiang Department of Information Engineering, The Chinese University of Hong Kong Department of EECS,

More information

Routing and quality of service support for mobile ad hoc networks

Routing and quality of service support for mobile ad hoc networks Computer Networks 51 (2007) 3142 3156 www.elsevier.com/locate/comnet Routing an quality of service support for mobile a hoc networks Anelise Munaretto a,c, *, Mauro Fonseca b,c a CPGEI/UTFPR, Programa

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

Additional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication

Additional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Aitional Divie an Conquer Algorithms Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Divie an Conquer Closest Pair Let s revisit the closest pair problem. Last

More information

Dynamic Capacity Allocation in OTN Networks

Dynamic Capacity Allocation in OTN Networks Communications an Network, 2015, 7, 43-54 Publishe Online February 2015 in SciRes. http://www.scirp.org/journal/cn http://x.oi.org/10.4236/cn.2015.71005 Dynamic Capacity Allocation in OTN Networks Maria

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Divide-and-Conquer Algorithms

Divide-and-Conquer Algorithms Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:

More information

Algorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times

Algorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times Algorithm for Intermoal Optimal Multiestination Tour with Dynamic Travel Times Neema Nassir, Alireza Khani, Mark Hickman, an Hyunsoo Noh This paper presents an efficient algorithm that fins the intermoal

More information

2-connected graphs with small 2-connected dominating sets

2-connected graphs with small 2-connected dominating sets 2-connecte graphs with small 2-connecte ominating sets Yair Caro, Raphael Yuster 1 Department of Mathematics, University of Haifa at Oranim, Tivon 36006, Israel Abstract Let G be a 2-connecte graph. A

More information

Variable Independence and Resolution Paths for Quantified Boolean Formulas

Variable Independence and Resolution Paths for Quantified Boolean Formulas Variable Inepenence an Resolution Paths for Quantifie Boolean Formulas Allen Van Geler http://www.cse.ucsc.eu/ avg University of California, Santa Cruz Abstract. Variable inepenence in quantifie boolean

More information

Cascading Multi-Hop Reservation and Transmission in Underwater Acoustic Sensor Networks

Cascading Multi-Hop Reservation and Transmission in Underwater Acoustic Sensor Networks Sensors 2014, 14, 18390-18409; oi:10.3390/s141018390 Article OPEN ACCESS sensors ISSN 1424-8220 www.mpi.com/journal/sensors Cascaing Multi-Hop Reservation an Transmission in Unerwater Acoustic Sensor Networks

More information

A SWARM INSPIRED MULTIPATH DATA TRANSMISSION WITH CONGESTION CONTROL IN MANETS USING PROBABILISTIC APPROACH

A SWARM INSPIRED MULTIPATH DATA TRANSMISSION WITH CONGESTION CONTROL IN MANETS USING PROBABILISTIC APPROACH A SWARM INSPIRED MULTIPATH DATA TRANSMISSION WITH CONGESTION CONTROL IN MANETS USING PROBABILISTIC APPROACH Subhankar oarar 1, Vanana Bhattacheree 2 an Debasis Giri 1 1 Department of Computer Science an

More information

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter FDL sel. VOA SOA 100 Regular papers ONDM 2018 Scalable Deterministic Scheuling for WDM Slot Switching Xhaul with Zero-Jitter Bogan Uscumlic 1, Dominique Chiaroni 1, Brice Leclerc 1, Thierry Zami 2, Annie

More information

Performance Study of a Cross-Layer Based Multipath Routing Protocol for IEEE e Mobile Ad Hoc Networks

Performance Study of a Cross-Layer Based Multipath Routing Protocol for IEEE e Mobile Ad Hoc Networks I. J. Communications, Network an System Sciences, 2008, 4, 285-385 Publishe Online November 2008 in SciRes (http://www.scirp.org/journal/ijcns/). Performance Stuy of a Cross-Layer Base Multipath Routing

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

Acknowledgement. Flow Graph Theory. Depth First Search. Speeding up DFA 8/16/2016

Acknowledgement. Flow Graph Theory. Depth First Search. Speeding up DFA 8/16/2016 8/6/06 Program Analysis https://www.cse.iitb.ac.in/~karkare/cs68/ Flow Graph Theory Acknowlegement Slies base on the material at http://infolab.stanfor.eu/~ullman/ragon/ w06/w06.html Amey Karkare Dept

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

Learning convex bodies is hard

Learning convex bodies is hard Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

Adjusted Probabilistic Packet Marking for IP Traceback

Adjusted Probabilistic Packet Marking for IP Traceback Ajuste Probabilistic Packet Marking for IP Traceback Tao Peng, Christopher Leckie, an Kotagiri Ramamohanarao 2 ARC Special Research Center for Ultra-Broaban Information Networks Department of Electrical

More information

An Extended AODV Protocol for Multipath Routing in MANETs

An Extended AODV Protocol for Multipath Routing in MANETs IACSIT International Journal of Engineering and Technology, Vol.2, No.4, August 21 An Extended Protocol for Multipath Routing in MANETs N.Jaisankar 1 and R.Saravanan 2 Abstract Mobile ad hoc networks (MANETs)

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

Compiler Optimisation

Compiler Optimisation Compiler Optimisation Michael O Boyle mob@inf.e.ac.uk Room 1.06 January, 2014 1 Two recommene books for the course Recommene texts Engineering a Compiler Engineering a Compiler by K. D. Cooper an L. Torczon.

More information

Trailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks

Trailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks Trailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks Xinxin Liu, Han Zhao, Xin Yang Computer & Information Science & Eng. University of Floria Email:{xinxin,han,xin}@cise.ufl.eu

More information

Performance Modelling of Necklace Hypercubes

Performance Modelling of Necklace Hypercubes erformance Moelling of ecklace ypercubes. Meraji,,. arbazi-aza,, A. atooghy, IM chool of Computer cience & harif University of Technology, Tehran, Iran {meraji, patooghy}@ce.sharif.eu, aza@ipm.ir a Abstract

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

A Review of Pro-Active and Re-Active Routing protocols for Mobile Ad-hoc Network

A Review of Pro-Active and Re-Active Routing protocols for Mobile Ad-hoc Network A Review of Pro-Active and Re-Active Routing protocols for Mobile Ad-hoc Network T. Sivaraman, Department of Computer Science, Thiruvalluvar University Arts & Science College, Thiruvennainallur. Tamilnadu,

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Politecnico i Torino Porto Institutional Repository [Proceeing] Automatic March tests generation for multi-port SRAMs Original Citation: Benso A., Bosio A., i Carlo S., i Natale G., Prinetto P. (26). Automatic

More information

A New Multicast Wavelength Assignment Algorithm in Wavelength-Converted Optical Networks

A New Multicast Wavelength Assignment Algorithm in Wavelength-Converted Optical Networks Int J Communications, Network and System Sciences, 2009, 2, 912-916 doi:104236/ijcns200929106 Published Online December 2009 (http://wwwscirporg/journal/ijcns/) A New Multicast Waelength Assignment Algorithm

More information

TCP Timeout Mechanism for Optimization of Network Fairness and Performance in Multi-Hop Pipeline Network

TCP Timeout Mechanism for Optimization of Network Fairness and Performance in Multi-Hop Pipeline Network Draft Version - Brunel University, Lonon TCP Timeout Mechanism for Optimization of Network Fairness an Performance in Multi-Hop Pipeline Network Siva Kumar Subramaniam 1, Rajagopal Nilavalan 3, Wamaeva

More information

EFFICIENT MULTICAST DATA REPLICATION APPROACH FOR POWER CONSUMPTION IN MANET

EFFICIENT MULTICAST DATA REPLICATION APPROACH FOR POWER CONSUMPTION IN MANET EFFICIENT MULTICAST DATA REPLICATION APPROACH FOR POWER CONSUMPTION IN MANET 1 T.KARTHIKEYAN, 2 DR.A.RAJARAM 2 Research Scholar, Karpagam University, Coimbatore, Inia 1 Associate Professor, Department

More information