Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots

Size: px
Start display at page:

Download "Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots"

Transcription

1 Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, , Japan Abstract Several loa balancing techniques for IP routing scheme have appeare in the literature. However, they require optimization process to compute optimal paths to meet traffic eman so that it requires a mechanism to measure traffic eman an to share them among all routes in orer to follow ynamics of traffic. It naturally results in communication overhea an losing sensitivity to follow traffic ynamics. In this paper, we investigate a loa balancing mechanism from another approach, i.e., base on IP fast reroute mechanisms. The main iea is simply to forwar packets into etour paths supplie by IP fast reroute mechanisms only when packets meet congestion. This strategy enables us to use vacant resources aaptively as soon as they are require to avoi an issolve the congestion. Through traffic simulation we show that IP fast reroute base loa balancing mechanisms improve the capacity of networks. I. INTRODUCTION Recent growth of the Internet an the rapi increase of user traffic require more banwith an communication quality for infrastructure networks. To make the most of existing network resources, several traffic engineering (TE) techniques have been propose so far. Currently TE techniques for MPLS scheme have become important [1] an several techniques are working in practice mainly in backbone networks. However, since MPLS capable routers are expensive, IP routing is still use in consierable part of networks. For IP routing scheme, several TE techniques have also been propose. Forts et al. [2] first presente the metho to optimize link metrics. They formulate the link metric optimization problem by means of linear programming which compute the optimal link metrics to make the most of network resources assuming that traffic eman among every pair of noes is given. Their work also presente that IP base TE achieves the similar level of loa balance performance compare to MPLS base TE techniques. However, it is consiere true that, in IP base shortest-path scheme, traffic tens to be concentrate on particular links or noes since the shortest-paths ten to use the common low-cost links. On this point of view, Dasgupta et al. [3] presente a result of performance comparison between the metric-optimize IP shortest path scheme an the MPLS base traffic engineering scheme. Their simulation emonstrate that uner the traffic variation coming from link failure, IP base TE often brings severe congestion hotspots cause of concentration of shortest paths, while MPLS base TE cause much less congestion. This result implies that there is still room to improve IP base TE techniques. As a more efficient loa balancing approach, several multipath loa-balancing schemes have been propose as IP base TE technique. Mishra et al. presente OSPF-base TE technique S-OSPF (Smart-OSPF) [4], in which source noes istribute traffic to their neighbor noes to try loa balancing among the shortest paths from neighbor noes. Antić et al. presente TPR (Two Phase Routing) [5] which once forwars packets to some intermeiate noes using IP tunnels an then forwars them to their estinations using normal shortest paths. They are capable of more efficient loa balancing than metric-optimization base traffic engineering. They both, however, require the optimization process which computes the paths for traffic istribution from traffic eman matrix. In practice, the optimization process requires the mechanisms to measure the traffic eman, to share the measure information among all noes, an to re-compute the new istribution paths. This process woul results in losing sensitivity for ynamic transition of traffic. In this paper, as another approach of loa balancing in IP routing schemes, we propose an IP fast reroute base loa balancing mechanisms. IP fast reroute is the technique to prevent packets from losing in case of link/noe or component failure using pre-compute alternative paths. IP fast reroute techniques achieve very fast recovery against failure, but its pre-compute paths are use only in case of failure. The loa balancing mechanism we propose utilizes those unuse paths even uner normal state to reuce congestion hot spots of networks. The approach of loa balancing using IP fast reroute has several goo characteristics as follows: 1. Packet forwaring is base on local ecision so that no aitional communication overhea (especially on traffic eman) is require for loa balancing. 2. No optimization process is require to follow ynamics of traffic so that sensitive response is achieve for traffic transition. This property is effective especially in case of failure protecte by IP fast reroute mechanisms. 3. Possible to work seamlessly with IP fast reroute mechanisms which provie failure protection function within the same framework. 4. Since only the packets face to be roppe are etoure, communication paths are basically the same as the shortest-path routing scheme. Namely, the current operational experience over traffic estimation is available /11/$ IEEE

2 x y estination x y (a) (b) Fig. 2. The Propose Loa Balancing Mechanisms x (c) y Fig. 1. The SBR Mechanism Primary tables Backup tables Backup tables with switch label as it is. Note that the iea of loa balancing using IP fast reroute is natural an may not be new. To the best of our knowlege, however, this work is the first specific mechanism escription an the first investigation on the performance of IP fast reroute base loa balancing mechanisms. The remainer of the paper is organize as follows: In Section 2 we escribe the base IP fast reroute mechanism calle SBR (Single Backup-table Rerouting) an present our loa balancing technique over SBR. In Section 3 we give the results of traffic simulation to show the performance of our mechanisms. In Section 4 we escribe several IP fast rerouting schemes propose ever an iscuss how we can implement loa balancing in them an the performance issue. Finally in Section 5 we give the concluing remarks. II. LOAD BALANCING MECHANISMS USING IP FAST REROUTE SCHEME SBR A. SBR Mechanisms In this section we explain the base IP fast reroute mechanism SBR (Single Backup-table Rerouting) [16] [17] an escribe how packets are forware into backup paths. SBR is an IP fast reroute scheme which recovers every single link failure with low overhea, i.e., two 1-bit flags in packet heaer an one aitional routing table. Note that there are several major IP fast reroute mechanisms stuie so far, but we use SBR as the base scheme since the mechanism is convenient to esign loa balancing functions. The consieration about other IP fast reroute scheme is seen in Sec. 4. SBR is first escribe in theoretical manner [16] an later its practical protocol to exten OSPF framework is presente in [16]. Note that the algorithm to compute backup routing table is similar to [19]; the main ifference as link protection framework is that SBR consiers link metrics to compute backup paths. The mechanism of SBR is illustrate in Fig. 1. Since we escribe SBR as an extension to the link-state routing scheme, it is assume that every noe has its primary routing table which represents the shortest-path tree for each estination. In SBR, every router has a seconary routing table, calle backup table, to recover any single link failure. Fig. 1(a) shows the situation that every noe (except ) in the network has its primary next-hop an backup next-hop for estination. Primary next-hops are inicate by soli arrows an Backup next-hops by two sort of broken arrows. Note that each backup next-hop (entry) is istinguishe into two types backup or switch, where switch type plays a special role in forwaring packets. See Fig. 1(b) for an example. Once a link (x, ) fails, the noe x etects it an immeiately forwars packets to u instea of, using its backup next-hop. Then the packets travel along backup next-hops for a while, an after going through that of switch type, i.e., (v,w) in this figure, they return to the primary route to reach the estination. Namely, packets sent from u estine to travel along the path u x u v w y. Such forwaring is realize by a 1-bit b-flag on packet heaer; keep b-flag 0 when a packet uses primary tables, change to 1 when the packet is firstly forware using backup tables (at x in Fig. 1(b)), then return to 0 when the packet passes a backup next-hop of type switch (at v in Fig. 1(b)) Namely, this flag represents which table to be use to forwar the packet. SBR is able to protect every single link failure. Fig. 1(c) is the example when link (y, ) faile. The packets sent from w estine to travel along the path w y v x. Aitionally in SBR, we introuce another 1-bit flag calle r-flag on packet heaer, which prevents loops in case of multiple link failure. The r-flag is set when a packet first returne to the shortest path (i.e., when the b-flag is first reset), an the packet with r-flag is never forware into backup nexthop. Namely, r-flag limits the number of etouring in orer to prevent loops cause of rerouting. B. Loa Balancing Mechanisms base on SBR Base on SBR, we propose a loa balancing technique to utilize vacant resources aaptively. Our strategy is simply to rescue the packets which are to be roppe as they have met congestion, by means of forwaring them into the backup path

3 TABLE I FORMAL FORWARDING PROCESS AT EACH ROUTER IN THE PROPOSED METHOD Flags an Counters (b,r) Conitions on Queue Process of Forwaring Flag Processing q (p) <T 1 forwaring into Primary Next-hop (0,0) q (p) T 1 an q (b) <T 1 forwaring into Backup Next-hop Increment r-counter, an set b-flag if the Backup Table entry is not s-labele. q (p) T 1 an q (b) T 1 rop q (p) <T 2 forwaring into Primary Next-hop (0,n) q (p) T 2 an q (b) <T 2 Backup Next-hop Increment r-counter, an set b-flag if the Backup Table entry is not s-labele. 1 n<max q (p) T 2 an q (b) T 2 rop (0,max) q (p) <T 2 forwaring into Primary Next-hop q (p) T 2 rop (1,n) q (b) <T 2 forwaring into Backup Next-hop Reset b-flag if Backup Table entry is s- labele. 1 n max q (b) T 2 rop instea of the primary path. Our metho etects congestion using output queue length. See Fig. 2. There is a router with three links. When a packet without b-flag arrive at the router, the router makes route ecision for it, i.e., ecies the output interface using the queue length for the primary next-hop of the packet. Namely, when the sum of queue length an the packet size is longer than threshol T 1 (T 1 is usually set as 100% of the queue length), the packet is enqueue into the queue of backup interface with the packet s b-flag set, an otherwise the packet is enqueue into the queue of primary interface. This simple rule, however, causes the etour chain problem. The etour chain problem is that etouring packets occurre from a congestion cause another congestion to generate etouring packets again, an this etouring continues like a chain. This problem must be avoie since the chain generates lots of etour packets which heavily consume network resources, an in the worst case they may form a loop, resulting in amplification of congestion. To prevent the problem from occurring, we introuce another threshol T 2 on the output queue to suppress etouring packets before they cause a new congestion. When a packet with b-flag or r-flag arrive at the router, the router checks the queue length of the backup interface to ecie the route to forwar it. If the queue length is longer than T 2 the router rops the etouring packet, an otherwise forwars it into the corresponing next-hop accoring to the forwaring rule of SBR. Note that we etour packets only if the packets are to be roppe uner the conventional single shortest-path scheme. Our strategy is to use vacant resources to rescue packets as long as they o not cause any ba effect on (non-etouring) shortest-path traffic. By protecting the shortest-path traffic from the harm of etouring traffic, we try to have the shortestpath traffic behave the same as in the non-loa-balance scheme, even in our loa balancing environment. Note that to reuce the ba effect (such as elay) on shortest-path traffic, it is important that T 2 is sufficiently small, while T 2 shoul hol minimum necessary value to cover the fluctuation of traffic istribution. C. Enabling Multiple Detour We further consier etouring packets more than once to improve the performance in larger networks. In a larger network, a packet meets congestion more than once with higher probability so that multiple etouring is essential from the viewpoint of scalability. To enable this, we introuce r-count instea of r-flag in packet heaer which inicates the number of etouring that the packet experience. By introucing the maximum allowe number of etouring for each packet, we allow several etouring while preventing packet loops. If we allow etouring three times, a 2-bit fiel is require for r-count. The change on router behavior is simple: if a packet without b-flag is receive an the primary next-hop is congeste (i.e., the queue length is more than T 1 ), the router forwars the packet into backup next-hop an increments the r-count of the packet only if which r-count is lower than the maximum allowe value, an the packet is roppe if the r-count is equal to the maximum allowe value. Note that only the packets which are using primary route (i.e., the packet without b- flag) can be etoure, because SBR oes not provie further backup paths of the packets which are alreay using backup paths. Table. I summarizes the whole behavior of routers in our proposal. This table shows the process of route ecision at each router when a packet arrive at the router. In etail, it presents the operation process on forwaring an flag manipulation for each state of packet heaer (b, r) an queue length. Here, let (b, r) be the b-flag an the r-counter of the packet, let max be the number of maximum allowe etouring, an let q (p) an q (b) be the queue length of the output queue for the primary an backup next-hop, respectively. III. TRAFFIC SIMULATION A. Simulation Setup We evaluate the propose loa balancing metho through traffic simulation using ns-2 [23] simulator with ranom topologies. To evaluate the performance of the case where traffic is partially concentrate on particular links, our scenario is esigne to locate several narrower links to cause congestion. Our simulation settings are shown as follows: We

4 Improvement of Throughput [%] 14.00% 12.00% % 6.00% 4.00% 2.00% Average Loa of Shortest-Path Packets per Link [%] Ratio of Detour Packets [%] 100% 90% 80% 70% 60% 50% num of etour: 3 num of etour: 2 40% num of etour: 1 30% 20% 10% 0% Increase of Packet Delay [%] 6.00% 5.00% 4.00% 3.00% 2.00% 1.00% num of noes: 30 num of noes: 100 Fig. 5. The Specification of Number of Detour to Fig. 3. Improvement of Throughput with Variation Reach Destination (Case of 30 Noes) Fig. 7. of Traffic Loa Traffic Increase of Packet Delay of Shortest-Path Ratio of Packet Rescue [%] Ratio of Detour Packets [%] 100% 90% 80% 70% 60% 50% num of etour: 3 num of etour: 2 40% num of etour: 1 30% 20% 10% 0% Ratio of Throughput [%] % % % 99.00% num of noes: 30 num of noes: 100 Fig. 4. Ratio of Packets Rescue by Detouring Fig. 6. The Specification of Number of Detour to Fig. 8. Reach Destination (Case of 100 Noes) Ratio of Throughput of Shortest-Path Traffic generate network topology of Waxman moel with 30 an 100 noes, respectively, using topology generator BRITE [20]. We select 10% of the links ranomly as bottleneck links which banwith is 50Mbps while normal link banwith is 100 Mbps. In this network, we generate several 10Mbps CBR flows with 1-kilobyte packets which source an estination noes are also selecte ranomly. We increase the CBR flows with time to raise the loa of the network. Output queue length is as long as 50 packets. Threshol T 1 is 100% an T 2 is 10% of the output queue length. The number of maximum allowe etouring is set to 3. Simulation is one by generating 10 topologies an for each topology we select ifferent two sets of bottleneck links an traffic patterns, an then we use average values to show the results. B. Simulation Results Simulation results are shown in Fig Fig. 3 shows the improvement of total network throughput of the propose metho compare to conventional single-path OSPF routing, with the variation of network loa. Network loa is inicate by average link usage of shortest-path packets, i.e., the packets which is not etoure. Note that since the number of flows transmitte is the same, the amount of shortest-path traffic is the same in both OSPF an the propose. The result shows that, in both 30 noes an 100 noes, the propose metho improve network throughput as the amount of traffic raise, an at 40-50% of link usage the improvement reach about 10%. There are a little ifference between the case of 30 noes an 100 noes, but totally they inicate the similar performance. Fig. 4 shows the ratio of packets rescue among all etoure packets. The both cases inicate the similar performance an when the link loa is 20-30% the rescue ratio is very high. Fig. 5 shows the specification of rescue packets in the number of etouring experience. The most part of them is rescue by one etouring while two an three times etoure packets occupy consierable part of them. Also, this result inicates that more than three etour will not be effective because it will rescue only a small number of packets. Fig. 6 shows the same specification in the case of 100 noes. The similar property is seen here except that the ratio of more than one etour goes larger. As for the ba effect of etouring traffic on shortest-path traffic, see Fig. 7 an Fig. 8. Fig. 7 shows that the elay of the shortest-path packets increase at most only 5%, which woul be the practical level making no problems. Note that we can ecrease the elay if we use smaller T 2 value, which is the trae-off between the elay an the buffer for the fluctuation of traffic. In Fig. 8 the ratio of shortest-path traffic throughput between OSPF an the propose metho are compare. In both cases of 30 noes an 100 noes, the throughput of shortestpath traffic is almost the same between OSPF an the propose metho, an this tren is the same regarless of the number of noes. From the whole results above, the propose metho rescues packets to improve at most 10% of throughput using vacant resources while they (the etour packets) o not make ba effect on the shortest-path traffic. The propose metho improves total throughput by 10% even when the loa is uniformly increase in the network.

5 IV. CONSIDERATION OF BASE IP FAST REROUTE MECHANISMS In this paper we investigate the performance of loa balancing metho which is base on an IP fast reroute mechanism SBR. There are, however, several well stuie fast reroute mechanisms [7]- [19], an esigning loa balancing mechanisms base on them is also possible. Here we escribe the ifference among them an iscuss the issues to moify them to provie loa balancing functions. In esigning IP fast reroute mechanisms, the traeoff between the overhea require to exten routing protocols an the capability of the scheme is important. Lee et al. propose failure inferencing base fast rerouting technique FIR [11]. FIR requires an aitional routing table for each network interface as overhea, while it is capable to recover every single link failure. Later, they propose FIFR [12] [13] which recover single noe failure with the same overhea. Shan et al. propose IP fast reroute techinique base on the approach calle NotVia aresses [9]. It recovers single noe/link failure by forwaring packets first to some intermeiate noes using IP tunnels, an then forwaring them to their estinations using shortest paths. In this scheme we nee overhea of IP encapsulation an the table of intermeiate noes for each estination. Kvalbein et al. propose a multi-tree approach of noe protection calle MRC [14] [15], which computes multiple spanning trees compute from the topologies in which several noes an links are isolate from the original topology. Those schemes recover every single noe/link failure an possibly multiple failures. As the overhea they require a mark on packet heaer to istinguish which tree the packet follows, an have to maintain multiple trees reay to forwar packets. To esign loa balancing mechanisms with those schemes, we have to implement 1) the counter of rerouting to prevent loops an 2) the flag to juge whether a packet is uner etour or not to give priority to the shortest-path traffic. Although small techniques may be require, basically it is not ifficult to implement them on the schemes above. As for the ifference between loa balancing performances, we say that the performance epens on backup paths compute by IP fast reroute schemes. Thus, although small variation will be seen, the link-protection scheme (e.g., FIR an NotVia with Link protection) base loa balancing mechanisms are likely to perform as well as the SBR base mechanism implemente in this work. Naturally, noe protection base loa balancing or multi-tree (MRC) base loa balancing will achieve better performance for hot spots covering wier area. V. CONCLUDING REMARKS In this paper we investigate a loa balancing technique base on IP fast reroute mechanisms. Our metho etours packets only when the packets meet congestion to make the most of vacant resources of networks. Through traffic simulation with increasing network loa, we foun that the propose metho improves network capacity at most 10% uner the scenario with congestion hot-spots. Also in low-loa state, significant ratio of packets is rescue by our scheme. As future work, it is essential to take TCP traffic into account. Specifically, since TCP performance is egrae ue to packet reorering, we have mainly two choices to eal with TCP traffic, i.e., 1) etouring TCP traffic such that packets in a flow use the same path, an 2) etouring only UDP packets in orer to avoi/issolve congestion hot spots. To fin the better choice is one of the important issues. REFERENCES [1] D.O. Awuche, J. Malcolm, J. Agogbua, M. O Dell, an J. McManus, Requirements for Traffic Engineering Over MPLS, IETF RFC2702, [2] B. Forts an M. Thorup, Internet Traffic Engineering by Optimizing OSPF Weights, in Proc. INFOCOM2000, pp , [3] S. Dasgupta, J.C.e Oliveira, an J.P. Vasseur, A Performance Stuy of IP an MPLS Traffic Engineering Techniques uner Traffic Variations, IEEE Globecom2007, pp , [4] A.K. Mishra an A. Sahoo, S-OSPF: A Traffic Engineering Solution for OSPF base Best Effort Networks, In Proc. IEEE Globecom 2007, pp , [5] M. Antić an A. Smiljanić, Oblivious Routing Scheme Using Loa Balancing Over Shortest Paths, In Proc. IEEE ICC 2008, pp , [6] E. Oki an A. Iwaki, F-TPR: Fine Two-Phase IP Rerouting Scheme over Shortest Paths for Hose Moel, IEEE Communications Letters, Vol.13, No.4, pp , [7] S. Rai an B. Mukherjee, IP Resilience within an Autonomous System: Current Approachs, Challenges, an Future Directions, IEEE Communications Magazine, Vol. 43, No. 10, pp , Oct, [8] S. Bryan an M. Shan, IP fast-reroute framework, IETF Internet-raft raft-ietf-rtgwg-ipfrr-framework-09.txt, [9] M. Shan, S. Bryan an S. Previi, IP Fast Reroute Using Not-via Aresses, raft-ietf-rtgwg-ipfrr-notvia-aresses-04.txt, [10] C. Reichert, Y. Glickmann an T. Mageanz, Two Routing Algorithms for Failure Protection in IP Networks, in Proc. of 10th IEEE Symposium on Computers an Communications (ISCC2005), pp , [11] S. Lee, Y. Yu, S. Nelakuiti, Z.L. Zhang, an C.N. Chuah, Proactive vs. Reactive Approaches to Failure Resilient Routing, in Proceings IEEE INFOCOM 04, Mar [12] Z. Zhong, S. Nelakuiti, Y. Yu, S. Lee, J. Wang, an C.N. Chuah, Failure inferencing base fast rerouting for hanling transient link an noe failures, in Proceeings of IEEE Global Internet, Mar [13] J. Wang an S. Nelakuiti, IP Fast Reroute with Failure Inferencing, In proceeings of SIGCOMM workshop (INM) 2007, pp , [14] A. Kvalbein, A.F. Hansen, T. Čičić, S. Gjessing, an O. Lysne, Multiple routing configurations for fast IP network recovery, IEEE/ACM Transactions on Networking, Vol.17, Issue. 2, pp , [15] T. Čičić, A.F. Hansen, A. Kvalbein, M. Hartmann, R. Martin an M. Menth, Relaxe multiple routing configurations for IP fast reroute, In proceeings of NOMS2008, pp , [16] T. Yoshihiro, A Single Backup-Table Rerouting Scheme for Fast Failure Protection in OSPF, IEICE Transactions on Communications, Vol. E91- B, No. 9, pp , [17] H. Ito, K. Iwama, Y. Okabe, T. Yoshihiro, Single backup table schemes for shortest-path routing, Theoretical Computer Science, 333(3): , [18] H. Ito, K. Iwama, Y. Okabe an T. Yoshihiro, Polynomial-Time Computable Backup Tables for Shortest-Path Routing, In Proceeings of SIROCCO 2003, , Jun, [19] K. Xi an J. Chao, IP Fast Rerouting for Single-Link/Noe Failure Recovery, In Proc. IEEE BROADNETS2007, pp , [20] A. Meina, A. Lakhina, I. Matta, an J. Byers, BRITE: An approach to universal topology generation, in Proceeings of IEEE MASCOTS, pp , Aug, [21] B. Waxman, Routing of Multipoint Connections, IEEE J. Select. Areas Commun., December [22] A.L. Barábasi an R.Albert, Emergence of Scaling in Ranom Networks, Science, 286: , October [23] The network Simulator NS-2,

Reactive Load Balancing During Failure State in IP Fast Reroute Schemes

Reactive Load Balancing During Failure State in IP Fast Reroute Schemes Regular Paper Reactive Load Balancing During Failure State in IP Fast Reroute Schemes Kazuki Imura 1 Takuya Yoshihiro 2,a) Received: December 5, 2013, Accepted: March 7, 2014 Abstract: To improve reliability

More information

A New Backup Topology Design Method for Congestion Avoidance in IP Fast Reroute

A New Backup Topology Design Method for Congestion Avoidance in IP Fast Reroute International Journal of Networks and Communications 2012, 2(5): 123-131 DOI: 10.5923/j.ijnc.20120205.05 A New Backup Topology Design Method for Congestion Avoidance in IP Fast Reroute Simon Tembo 1,*,

More information

Physical-Layer Communication Recovery for Heterogeneous Network

Physical-Layer Communication Recovery for Heterogeneous Network Physical-Layer Communication Recovery for Heterogeneous Network Po-Kai Tseng 1, Wei-Ho Chung 1, Kate Ching-Ju Lin 1, Chi-Sheng Shih 2, and Ling-Jyh Chen 3 1 Research Center for Information Technology Innovation,

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance International Journal of Moern Communication Technologies & Research (IJMCTR) Impact of FTP Application file size an TCP Variants on MANET Protocols Performance Abelmuti Ahme Abbasher Ali, Dr.Amin Babkir

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stolyar Abstract Backpressure-base aaptive routing

More information

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,

More information

Supporting Fully Adaptive Routing in InfiniBand Networks

Supporting Fully Adaptive Routing in InfiniBand Networks XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar

More information

Enhancing TCP performance in IP fast reroute

Enhancing TCP performance in IP fast reroute Title Enhancing TCP performance in IP fast reroute Author(s) Mao, M; Wen, Z; Yeung, LK Citation The IEEE International Conference on Communications (ICC 2012), Ottawa, ON., 10-15 June 2012. In IEEE International

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stoylar arxiv:15.4984v1 [cs.ni] 27 May 21 Abstract

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

Routing and quality of service support for mobile ad hoc networks

Routing and quality of service support for mobile ad hoc networks Computer Networks 51 (2007) 3142 3156 www.elsevier.com/locate/comnet Routing an quality of service support for mobile a hoc networks Anelise Munaretto a,c, *, Mauro Fonseca b,c a CPGEI/UTFPR, Programa

More information

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun

More information

On the Placement of Internet Taps in Wireless Neighborhood Networks

On the Placement of Internet Taps in Wireless Neighborhood Networks 1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that

More information

Adjusted Probabilistic Packet Marking for IP Traceback

Adjusted Probabilistic Packet Marking for IP Traceback Ajuste Probabilistic Packet Marking for IP Traceback Tao Peng, Christopher Leckie, an Kotagiri Ramamohanarao 2 ARC Special Research Center for Ultra-Broaban Information Networks Department of Electrical

More information

On the Feasibility and Efficacy of Protection Routing in IP Networks

On the Feasibility and Efficacy of Protection Routing in IP Networks University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering 2-0-2009 On the Feasibility an Efficacy of Protection Routing in IP Networks Kin-Wah

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks Provisioning Virtualize Clou Services in IP/MPLS-over-EON Networks Pan Yi an Byrav Ramamurthy Department of Computer Science an Engineering, University of Nebraska-Lincoln Lincoln, Nebraska 68588 USA Email:

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Lab work #8. Congestion control

Lab work #8. Congestion control TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 173 A Review of Various Approaches to Multipath Routing Maryada M.Tech. Student, Department of Computer Science

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Multicast Routing : Computer Networking. Example Applications. Overview

Multicast Routing : Computer Networking. Example Applications. Overview Multicast outing 5-744: Computer Networking Unicast: one source to one estination Multicast: one source to many estinations Two main functions: Efficient ata istribution Logical naming of a group L-0 Multicast

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients Probabilistic Meium Access Control for 1 Full-Duplex Networks with Half-Duplex Clients arxiv:1608.08729v1 [cs.ni] 31 Aug 2016 Shih-Ying Chen, Ting-Feng Huang, Kate Ching-Ju Lin, Member, IEEE, Y.-W. Peter

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Optimal Oblivious Path Selection on the Mesh

Optimal Oblivious Path Selection on the Mesh Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks Hinawi Publishing Corporation International Journal of Distribute Sensor Networks Volume 2014, Article ID 936379, 17 pages http://x.oi.org/10.1155/2014/936379 Research Article REALFLOW: Reliable Real-Time

More information

Optimal Link Capacity Dimensioning in Proportionally Fair Networks

Optimal Link Capacity Dimensioning in Proportionally Fair Networks Optimal Link Capacity Dimensioning in Proportionally Fair Networks Micha l Pióro 1,Gábor Malicskó 2, an Gábor Foor 3 1 Department of Communication Systems, Lun Institute of Technology, Sween, Michal.Pioro@telecom.lth.se

More information

TCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model

TCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model TCP Symbiosis: Congestion Control Mechanisms of TCP base on Lotka-Volterra Competition Moel Go Hasegawa Cybermeia Center Osaka University 1-3, Machikaneyama-cho, Toyonaka, Osaka 56-43, JAPAN Email: hasegawa@cmc.osaka-u.ac.jp

More information

Chapter 9 Memory Management

Chapter 9 Memory Management Contents 1. Introuction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threas 6. CPU Scheuling 7. Process Synchronization 8. Dealocks 9. Memory Management 10.Virtual Memory

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Detour Planning for Fast and Reliable Failure Recovery in SDN with OpenState

Detour Planning for Fast and Reliable Failure Recovery in SDN with OpenState Detour Planning for Fast an Reliable Failure Recovery in SDN with OpenState Antonio Capone, Carmelo Cascone, Alessanro Q.T. Nguyen, Brunile Sansò Dipartimento i Elettronica, Informazione e Bioingegneria,

More information

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly

More information

MODULE VII. Emerging Technologies

MODULE VII. Emerging Technologies MODULE VII Emerging Technologies Computer Networks an Internets -- Moule 7 1 Spring, 2014 Copyright 2014. All rights reserve. Topics Software Define Networking The Internet Of Things Other trens in networking

More information

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks Optimal Routing an Scheuling for Deterministic Delay Tolerant Networks Davi Hay Dipartimento i Elettronica olitecnico i Torino, Italy Email: hay@tlc.polito.it aolo Giaccone Dipartimento i Elettronica olitecnico

More information

A Hybrid Routing Algorithm for Delay Tolerant Networks

A Hybrid Routing Algorithm for Delay Tolerant Networks Sensors & Transucers 2013 by IFSA http://www.sensorsportal.com A Hybri Routing Algorithm for Delay Tolerant Networs Jianbo LI, Jixing XU, Lei YOU, Chenqu DAI, Jieheng WU Information Engineering College

More information

Fast IP Network Recovery using MRC

Fast IP Network Recovery using MRC International Journal of Research in Computer Science ISSN 2249-8257 Volume 1 Issue 1 (2011) pp. 75-88 White Globe Publications www.ijorcs.org Fast IP Network Recovery using MRC T.K Rajesh 1, N. Sreenivasulu

More information

Improving Performance of Sparse Matrix-Vector Multiplication

Improving Performance of Sparse Matrix-Vector Multiplication Improving Performance of Sparse Matrix-Vector Multiplication Ali Pınar Michael T. Heath Department of Computer Science an Center of Simulation of Avance Rockets University of Illinois at Urbana-Champaign

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

Link/Node Failure Recovery through Backup Path Lengths

Link/Node Failure Recovery through Backup Path Lengths Link/Node Failure Recovery through Backup Path Lengths Ravula Prathap Kumar, Banothu Balaji, Dasari Yakobu, N Sai Bala Kishore Department of Computer Science and Engineering, Vignan University, Guntur,

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

Modifying ROC Curves to Incorporate Predicted Probabilities

Modifying ROC Curves to Incorporate Predicted Probabilities Moifying ROC Curves to Incorporate Preicte Probabilities Cèsar Ferri DSIC, Universitat Politècnica e València Peter Flach Department of Computer Science, University of Bristol José Hernánez-Orallo DSIC,

More information

HOW DO SECURITY TECHNOLOGIES INTERACT WITH EACH OTHER TO CREATE VALUE? THE ANALYSIS OF FIREWALL AND INTRUSION DETECTION SYSTEM

HOW DO SECURITY TECHNOLOGIES INTERACT WITH EACH OTHER TO CREATE VALUE? THE ANALYSIS OF FIREWALL AND INTRUSION DETECTION SYSTEM HOW O SECURTY TECHNOLOGES NTERACT WTH EACH OTHER TO CREATE VALUE? THE ANALYSS O REWALL AN NTRUSON ETECTON SYSTEM Huseyin CAVUSOGLU Srinivasan RAGHUNATHAN Hasan CAVUSOGLU Tulane University University of

More information

Key words: TCP/IP, IGP, OSPF Routing protocols, MRC, MRC System.

Key words: TCP/IP, IGP, OSPF Routing protocols, MRC, MRC System. www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume2 Issue 8 August, 2013 Page No. 2628-2634 Multiple Routing Configurations For Fast Ip Network Recovery Sk.Meeravali

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Spare Capacity Planning Using Survivable Alternate Routing for Long-Haul WDM Networks

Spare Capacity Planning Using Survivable Alternate Routing for Long-Haul WDM Networks Spare Capacity Planning Using Survivable lternate Routing for Long-Haul WDM Networks in Zhou an Hussein T. Mouftah Department of lectrical an Computer ngineering Queen s University, Kingston, Ontario,

More information

PAPER. 1. Introduction

PAPER. 1. Introduction IEICE TRANS. COMMUN., VOL. E9x-B, No.8 AUGUST 2010 PAPER Integrating Overlay Protocols for Proviing Autonomic Services in Mobile A-hoc Networks Panagiotis Gouvas, IEICE Stuent member, Anastasios Zafeiropoulos,,

More information

OSPF with Deterministic Routing

OSPF with Deterministic Routing OSPF with Deterministic Routing Sachin Bojewar Associate Professor, Vidyalankar Institute of Technology, Wadala, Mumbai, India Dnyaneshwar Dhangar Vidyalankar Institute of Technology, Wadala, Mumbai, India

More information

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which

More information

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency Software Reliability Moeling an Cost Estimation Incorporating esting-effort an Efficiency Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, an Michael R. Lyu -+ Department of Electrical Engineering Computer Science

More information

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:

More information

Deterministic Routing in OSPF for Post Single Link Failure

Deterministic Routing in OSPF for Post Single Link Failure Deterministic Routing in OSPF for Post Single Link Failure Dnyaneshwar Dhangar 1, Sachin Bojewar 2 1 (Information Technology/ Mumbai, India) 1 (Information Technology/ Mumbai, India) ABSTRACT : In the

More information

Just-In-Time Software Pipelining

Just-In-Time Software Pipelining Just-In-Time Software Pipelining Hongbo Rong Hyunchul Park Youfeng Wu Cheng Wang Programming Systems Lab Intel Labs, Santa Clara What is software pipelining? A loop optimization exposing instruction-level

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

Algorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times

Algorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times Algorithm for Intermoal Optimal Multiestination Tour with Dynamic Travel Times Neema Nassir, Alireza Khani, Mark Hickman, an Hyunsoo Noh This paper presents an efficient algorithm that fins the intermoal

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks Coorinating Distribute Algorithms for Feature Extraction Offloaing in Multi-Camera Visual Sensor Networks Emil Eriksson, György Dán, Viktoria Foor School of Electrical Engineering, KTH Royal Institute

More information

A Metric for Routing in Delay-Sensitive Wireless Sensor Networks

A Metric for Routing in Delay-Sensitive Wireless Sensor Networks A Metric for Routing in Delay-Sensitive Wireless Sensor Networks Zhen Jiang Jie Wu Risa Ito Dept. of Computer Sci. Dept. of Computer & Info. Sciences Dept. of Computer Sci. West Chester University Temple

More information

CS350 - Exam 4 (100 Points)

CS350 - Exam 4 (100 Points) Fall 0 Name CS0 - Exam (00 Points).(0 points) Re-Black Trees For the Re-Black tree below, inicate where insert() woul initially occur before rebalancing/recoloring. Sketch the tree at ALL intermeiate steps

More information

Design of Policy-Aware Differentially Private Algorithms

Design of Policy-Aware Differentially Private Algorithms Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft

More information

Image Segmentation using K-means clustering and Thresholding

Image Segmentation using K-means clustering and Thresholding Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

Optimal Distributed P2P Streaming under Node Degree Bounds

Optimal Distributed P2P Streaming under Node Degree Bounds Optimal Distribute P2P Streaming uner Noe Degree Bouns Shaoquan Zhang, Ziyu Shao, Minghua Chen, an Libin Jiang Department of Information Engineering, The Chinese University of Hong Kong Department of EECS,

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,

More information

Efficient Recovery from False State in Distributed Routing Algorithms

Efficient Recovery from False State in Distributed Routing Algorithms Efficient Recovery from False State in Distribute Routing Algorithms Daniel Gyllstrom, Suarshan Vasuevan, Jim Kurose, Gerome Milau Department of Computer Science University of Massachusetts Amherst {pg,

More information

AODV Multipath Extension using Source Route Lists with Optimized Route Establishment

AODV Multipath Extension using Source Route Lists with Optimized Route Establishment INTERNATIONAL WORKHOP ON WIRELE A-HOC NETWORK (IWWAN) AOV Multipath Extension using ource Route Lists with Optimized Route Establishment Yusuke akurai and Jiro Katto Graduate chool of cience and Engineering,

More information

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques What is testing? ing is the process of emonstrating that errors are not present. The purpose

More information

Trailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks

Trailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks Trailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks Xinxin Liu, Han Zhao, Xin Yang Computer & Information Science & Eng. University of Floria Email:{xinxin,han,xin}@cise.ufl.eu

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

An Infrastructureless End-to-End High Performance Mobility Protocol

An Infrastructureless End-to-End High Performance Mobility Protocol Proceeings of the 5 IEEE International Conference on Electro Information Technology, 5, Lincoln Nebraska, May 5 An Infrastructureless En-to-En High Performance Mobility Protocol Saneep Davu, Rai Y. Zaghal

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

One-to-Many Multicast Restoration Based on Dynamic Core-Based Selection Algorithm in WDM Mesh Networks

One-to-Many Multicast Restoration Based on Dynamic Core-Based Selection Algorithm in WDM Mesh Networks Proceeings of the International MultiConference of Engineers an Computer Scientists 9 Vol I IMECS 9, March 18 -, 9, Hong Kong One-to-Many Multicast Restoration Base on Dynamic Core-Base Selection Algorithm

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University

More information

Interior Permanent Magnet Synchronous Motor (IPMSM) Adaptive Genetic Parameter Estimation

Interior Permanent Magnet Synchronous Motor (IPMSM) Adaptive Genetic Parameter Estimation Interior Permanent Magnet Synchronous Motor (IPMSM) Aaptive Genetic Parameter Estimation Java Rezaie, Mehi Gholami, Reza Firouzi, Tohi Alizaeh, Karim Salashoor Abstract - Interior permanent magnet synchronous

More information

UC Santa Cruz UC Santa Cruz Previously Published Works

UC Santa Cruz UC Santa Cruz Previously Published Works UC Santa Cruz UC Santa Cruz Previously Publishe Works Title Towars Loop-Free Forwaring of Anonymous Internet Datagrams that Enforce Provenance Permalink https://escholarship.org/uc/item/5376h1mm Author

More information

6.823 Computer System Architecture. Problem Set #3 Spring 2002

6.823 Computer System Architecture. Problem Set #3 Spring 2002 6.823 Computer System Architecture Problem Set #3 Spring 2002 Stuents are strongly encourage to collaborate in groups of up to three people. A group shoul han in only one copy of the solution to the problem

More information

A Hierarchical P2PSIP Architecture to support Skype-like services

A Hierarchical P2PSIP Architecture to support Skype-like services A Hierarchical P2PSIP Architecture to support Skype-like services Isaias Martinez-Yelmo, Carmen Guerrero, Ruben Cuevas Departamento e Ingeniería Telemática Universia Carlos III e Mari Av. Universia 30.

More information

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter FDL sel. VOA SOA 100 Regular papers ONDM 2018 Scalable Deterministic Scheuling for WDM Slot Switching Xhaul with Zero-Jitter Bogan Uscumlic 1, Dominique Chiaroni 1, Brice Leclerc 1, Thierry Zami 2, Annie

More information

Ad-Hoc Networks Beyond Unit Disk Graphs

Ad-Hoc Networks Beyond Unit Disk Graphs A-Hoc Networks Beyon Unit Disk Graphs Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich 8092 Zurich, Switzerlan {kuhn, wattenhofer, zollinger}@inf.ethz.ch ABSTRACT

More information

NAND flash memory is widely used as a storage

NAND flash memory is widely used as a storage 1 : Buffer-Aware Garbage Collection for Flash-Base Storage Systems Sungjin Lee, Dongkun Shin Member, IEEE, an Jihong Kim Member, IEEE Abstract NAND flash-base storage evice is becoming a viable storage

More information

EFFICIENT ON-LINE TESTING METHOD FOR A FLOATING-POINT ADDER

EFFICIENT ON-LINE TESTING METHOD FOR A FLOATING-POINT ADDER FFICINT ON-LIN TSTING MTHOD FOR A FLOATING-POINT ADDR A. Droz, M. Lobachev Department of Computer Systems, Oessa State Polytechnic University, Oessa, Ukraine Droz@ukr.net, Lobachev@ukr.net Abstract In

More information

Divide-and-Conquer Algorithms

Divide-and-Conquer Algorithms Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:

More information

A SWARM INSPIRED MULTIPATH DATA TRANSMISSION WITH CONGESTION CONTROL IN MANETS USING PROBABILISTIC APPROACH

A SWARM INSPIRED MULTIPATH DATA TRANSMISSION WITH CONGESTION CONTROL IN MANETS USING PROBABILISTIC APPROACH A SWARM INSPIRED MULTIPATH DATA TRANSMISSION WITH CONGESTION CONTROL IN MANETS USING PROBABILISTIC APPROACH Subhankar oarar 1, Vanana Bhattacheree 2 an Debasis Giri 1 1 Department of Computer Science an

More information