One-to-Many Multicast Restoration Based on Dynamic Core-Based Selection Algorithm in WDM Mesh Networks

Size: px
Start display at page:

Download "One-to-Many Multicast Restoration Based on Dynamic Core-Based Selection Algorithm in WDM Mesh Networks"

Transcription

1 Proceeings of the International MultiConference of Engineers an Computer Scientists 9 Vol I IMECS 9, March 18 -, 9, Hong Kong One-to-Many Multicast Restoration Base on Dynamic Core-Base Selection Algorithm in WDM Mesh Networks I-Shyan Hwang, *San-Nan Lee, Zen-Der Shyu an Kang-Peng Chen Abstract-This paper proposes a novel ynamic core-base selection (DCS) algorithm for the multicast restoration in WDM mesh networks. The core-base fault tolerance scheme provies a flexible way to control a number of core noes with less control overheas for searching the routing path, wavelength assignment (RWA) an restoration paths when fault occurs in the one-to-many multicast omain. Compare with the source-base scheme, core-base schemes are easier to maintain, an specifically scalable in large-scale topologies. In the core-base fault tolerance scheme, k-tuple omination noes are selecte to form a minimum size vertex subset such that each vertex in the graph is ominate by at least k vertices, where the k is efine as two in this paper. The propose DCS algorithm is efine as each noe in multicast tree session must be irectly connecte to at least one core noe in multicast tree session an also has to be irectly connecte to at least one core noe out of multicast tree session. The primary aim of this work is to provie the scalable an fast local survivability base on the information from core noes. Simulation results show that the propose algorithm outperforms the Dual Tree an MRLR algorithms in terms of total hop counts neee for all recovery paths an blocking probability for ifferent network topologies. Keywors: DCS, Multicast restoration, Local survivability, Dual Tree, MRLR. I. Introuction Optical networks with Dense Wavelength Division Multiplex (DWDM) can provie multiple ata channels to supply high spee, high capacity to perform banwith-intensive multicast transmission service [1] technology, which uses wavelength ivision, markely increases the banwith of existing optical fiber networks. Multicasting is the simultaneous elivery of ata stream from one or more sources to multiple receivers by using one or more tree-base structures in the network. The benefit of multicast is that the source sens a single copy to the entire estinations, such that multicast can utilize banwith efficiency. In general, the one-to-many multicast routing algorithm can be classifie as source-base moe an core-base moe. In source-base moe, multicast tree roote at the source noe an connecte to each member in the multicast session [2]. Then, ata packets originating from I-Shyan Hwang is a professor in the Department of Computer Science & Engineering at the Yuan-Ze University, Chung-Li, Taiwan (ishwang@saturn.yzu.eu.tw). San-Nan Lee is a assistant professor in the Department of Computer Science an Information Engineering at Vanung University, Chung-Li, Taiwan (Tel: ~727, Fax: ~7, gran@vnu.eu.tw). Zen-Der Shyu is currently pursuing the Ph. D egree at the Yuan-Ze University. Since 199, he serve as an instructor in the Army Acaemy R.O.C. Kang-Peng Chen receive M.S. egree in Department of Computer Science an Engineering from the Yuan-Ze University, Chung-Li, Taiwan in 8. the source noe are sent to all the estination noes via the links of multicast tree. The Distance Vector Multicast Routing Protocol (DVMRP) [3] is a ense moe routing protocol which has goo performance in network environments with high banwith an ensely istribute multicast session members. In heterogeneous Internet environment, it potentially has to support many thousans of multicast groups, each of which may be sparsely istribute, so this technique oes not scale well. The Protocol Inepenent Multicast-Dense Moe (PIM-DM) [4] is an efficient protocol when most receivers are intereste in the multicast ata, but oes not scale well across larger omains in which most receivers are not intereste in the ata. The main ifference between DVMRP an PIM-DM is that the PIM-DM introuces the concept of protocol inepenence such that any unerlying unicast routing protocol to perform reverse path forwaring checks. The Multicast Open Shortest Path First (MOSPF) [] is an extension to the Open Shortest Path First (OSPF) protocol to support multicast routing an allows routers to share information about group memberships. In core-base moe, some noes for each group are selecte as the core noes an multicast tree roote at core noe an constructe to span all the group members. Data packets flow from any source to its parent an chilren, such as Core-base Tree (CBT) [6] an Protocol Inepenent Multicast-Sparse Moe (PIM-SM) [7]. The CBT may buil one or multiple core-base biirectional trees which are share by all of the group's seners an receivers with core noe selection algorithm. However, the traffic may be concentrate at core noes, the scalability an more management cost shoul be consiere. The PIM-SM is an efficient routing protocol to multicast groups that span all estinations istribute sparsely in inter-omain network environment. The core-base scheme is preferable to source-base for multiple sources in the multicast group. The avantage of core-base scheme has less control overhea of a single share tree rather than multiple trees. Recent researches in core-base scheme focus on the multi-core selection by k-center or r-ominating in multicast trees [8]. Core noe selection algorithms can be classifie as (1) one core noe, an (2) multiple core noes selection [9]. The rest of this paper is organize as follows. Section II escribes relate work of survivability scheme in multicast. Next, Section III proposes a novel ynamic core-base selection (DCS) algorithm for one-to-many multicast restoration in WDM mesh networks, which is capable of proviing overall protection for optical noes an fibers. Section IV compares the system performance of the propose algorithm with the Dual Tree [] an Multiple Ring-base Local Restoration (MRLR) [] algorithms in terms of total hop counts neee for all ISBN: IMECS 9

2 Proceeings of the International MultiConference of Engineers an Computer Scientists 9 Vol I IMECS 9, March 18 -, 9, Hong Kong recovery paths an blocking probability for ifferent network topologies. Finally, conclusions are rawn in Section V. II. Multicast Fault Tolerance With the intensive banwith in DWDM optical fibers, a network function failure, such as network equipment corrupte or fiber cut, will cause serious ata loss. For protecting multicast session against failure, network survivability must be consiere in esigning DWDM networks. The light-tree protection for multicast has more challenging than the unicast in optical networks, since a link or a noe failure will affect several estinations at the same time. So keeping multicast session functionally nees a heuristic proceure an the objective is to achieve high reliability an fast recoveries with minimum backup resource an cost in the multicasting scheme. The preplanne fault tolerance with backup rerouting algorithm can provie fast recovery time, an it is suitable for one-to-many multicast with ifferent backup structures belonging to the reuce topology which incluing a set of backup paths to minimize the multicast tree cost after recovery. There are three categories in multicast fault tolerance schemes as shown in Fig. 1. Fig. 1 Three categories of multicast fault tolerance algorithms. Ring-base protection: Ring-base protection has been part of the transport network lanscape for some time ue to the wie eployment of ring network topologies. The first mesh-ring ecomposition is known as the noe cover [12], in which the set of rings is selecte such that each noe belongs to one or more rings an each link belongs to no more than one ring. A noe cover oes not necessarily cover all the links an the uncovere links remain unprotecte. This problem can be eliminate using the ring cover []. Each link must belong to at least one ring an all links are protecte, however, spare resources may be reunant. Unfortunately, eciing the minimal ring cover in non-planar networks is an NP-har problem an is not scalable. This type of algorithm can, therefore, recover quickly from failures an etermine how to allocate recovere traffic loas base on current traffic loa an the network banwith along the restoration paths. Tree-base protection: Link protection an path protection [14] are parts of the tree-base protection. The link protection is to fin a backup link between noes, but it causes a huge cost an waste banwith. The path protection establishes a isjoint path between each source-estination pair. The reunant tree protection is propose in [1] to establish a new multicast tree from original source to the estination noes bypassing the existing tree noes. In ual tree protection [], affecte leaf noes are connecte to an unaffecte leaf noe. It requires that the unerlying network topology is a bi-connecte graph, in which there are at least two vertex-isjoint or link-isjoint paths between any two noes. Four multicast tree fault tolerance schemes are propose in [16], namely, Group-base protection: The concept of Share Risk Link Group (SRLG) [17] is a group of network links that share a common physical resource. After an initial failure an before reprovisioning, it cannot support restoration for aitional failures to other light-paths in the same restoration group. Therefore, two or more working paths uner the same failure risk cannot share the same protection resource. The Share Banwith Assignment (SBA) [18] provies the ability using integer linear programming to allocate banwith an fin backup segments by ynamic programming when several multicast working paths sharing the common backup path. The Share Segment Protection with Reprovisioning (SSPR) [19] is similar to the SRLG that the SSPR can provie ual links fault tolerance an increase the banwith utilization. The propose ynamic core-base selection (DCS) algorithm is efine as each noe in multicast tree session must be irectly connecte to at least one core noe in multicast tree session an also has to be irectly connecte to at least one core noe out of multicast tree session. The DCS algorithm is extene to core noes selection which prouces the core-base tree to enhance restoration ability. III. Propose Algorithm In general, fining the k-tuple ominating set (k-ds) of a graph G = { V, E }, where noes set V = { v,, 1 v m } with m noes an links set E = { e1,, en } with n links, that ominates the multicast tree noes in a subset of core noes S, where S V, such that each noe in the subset V \ S is ajacent to at least k core noes in S. The value of k is given by two in this paper. The propose ynamic core-base selection (DCS) algorithm is efine as each noe in multicast tree session must be connecte to at least one core noe in multicast tree session an also the noe has to be connecte to one core noe out of multicast tree session. Each core noe has a core routing table (CRT) which recors the information between current core noe an other core noes, such as hop counts, available wavelengths, an the ominating noes of the current core noe. The available wavelength is use to gather wavelengths usage statistic for each link of recovery path. In aition, each non-core noe in multicast session has a non-core routing table (NCRT) which recors the information of its ominate core noes in terms of available wavelengths. Both tables are broacaste through control channels perioically to other noes for upating the information base on the network status. ISBN: IMECS 9

3 Proceeings of the International MultiConference of Engineers an Computer Scientists 9 Vol I IMECS 9, March 18 -, 9, Hong Kong The propose DCS algorithm is a istribute core selection algorithm which has two subsets: (1) multicast session member ominating set (MDS), (2) non-multicast session member ominating set (NDS). In such a way, each noe in one-to-many multicast session will be ominate at least twice to enhance the restoration ability. Both MDS an NDS are establishe by the DCS algorithm an shown as follows: Dynamic core-base selection (DCS) algorithm Input: Multicast session tree T, network topology Output: MDS an NDS 1. Initialize the MDS={s}, where s is root 2. All parent noes of leaf noes in T are ae to MDS 3. Delete leaf noes an parent noes of leaf noes, an then form new sub tree T 4. If T is not null. Go to Step 2 6. Calculate K={k 1,,k i }, where k i is the number of connections noe i in non-multicast session to the members in multicast session with one hop 7. The noe which has the maximal egree in K is ae to NDS 8. If all multicast session members are ominate by core noes in NDS or no one can be ominate 9. Done. else Go to Step k = k =3 6 k =4 12 k =1 Source = {2} Destinations = {9,12,14} MDS = {2,7, } NDS = {3,,,} 7 8 k 8 =2 Fig. 2 Example of the MDS an NDS The MDS is efine as each noe in the multicast session is ominate at least once by core noes resie in multicast session. Initially, the root noe of multicast session as the source noe is assume to be a core noe, an then fins the core noes from multicast leaf noes to the source noe, recursively. First, the parent noes of leaf noes are chosen as core noes an the leaf noes an parent noes of the chosen core noes are elete to form a new sub tree. This process is to make sure that each noe can be ominate once by core noes. Base on the new sub tree, the parent noes of the new leaf noes are chosen as core noes an the new leaf noes an parent noes of the chosen core noes are elete to form another new sub tree. Repeating the process until the source noe or null noe is left. For example, shown in Fig. 2. The NDS is efine as each noe in multicast session has at least once ominate by core noes from non-multicast session. The selection of core noe from non-multicast session is base on the connectivity for the noes in non-multicast session to the multicast session. Given K = { k1,..., k i }, where k i is the number of connections from noe i in non-multicast session to the members in multicast session with one hop. After calculating the K = { k1,..., k i } of each noe in non-multicast session to the multicast session, the noe with maximum k i is chosen as a core noe. Repeating the process until all multicast session members are ominate or no other core noes can be ominate. For example, shown in Fig. 2, calculating the k i of all noes in non-multicast session to the multicast session, e.g., noe have the k of 4, noe has the k of 3, noe 16 has k 16 of 1 an noe 4 has k 4 of, the other noes have the k, where i = { 1,3,8,,1} of 2. i Then, the noe with k of 4 is chosen as a core noe which can ominate the noes 6, 7, an 12; the noe with k of 3 is chosen as another core noe which can ominate the noes 6, 9 an ; the noe 3 with k 3 of 2 is chosen as a core noe which can ominate the noes 2 an 7, an noe with k of 2 is chosen as a core noe to ominate noes 9 an 14. Then, the NDS inclues noes 3,, an. A restoration scheme for one-to-many multicast communication (RSOMMC) algorithm to resolve the noe or link faults is propose in this session. When fault occurs, the upstream noe u, where u T, ajacent to the faile link or the faile noe will broacast the failure type an location, an etermine which estination noe(s) is affecte base on the CRT from S core or itself if the noe u is a core noe. Each affecte estination noe nees to fin the recovery paths P with minimum hop counts base on the following equation: P = Pv + Pcore + P, where P is the path from upstream noe of the faile v link or the parent noe of the faile noe to the ominating core noe, S core, P core is the path between the ominating core noe, S core, near the fault an core noe ominates the affecte estination noes, D core, an P is the path from the ominating core noe, D core to the affecte estination noes. The P v is null when the upstream noe of the faile link or the parent noe of the faile noe v is a core noe. Noe fault can be seen as multiple links fault an tries to fin the path from the upstream noe of the faile link or the parent noe of the faile noe to each estination noe iniviually. The propose algorithm can maintain multicast session an choose the minimum hop count to be P core. Once the P is etermine, core P v an P are also known then the recovery path is establishe. The pseuo coe of restoration scheme for one-to-many multicast communication (RSOMMC) for link failure or noe failure an the omination fault recovery scheme is escribe as follows: Restoration scheme for one-to-many multicast ISBN: IMECS 9

4 Proceeings of the International MultiConference of Engineers an Computer Scientists 9 Vol I IMECS 9, March 18 -, 9, Hong Kong communication (RSOMMC) Input: Core routing table (CRT), Non-core noe routing table (NCRT) Output: Recovery path 1. If a link fault occurs 2. The upstream noe of the faile link, u, fins the core noe S core that ominate the noe u, an core noe D core_i that ominates the affecte estination noes where i is the sequences of estination noes 3. Accoring the CRT an NCRT, the path P v is selecte from the source noe to S core base on the minimum hop counts, P is the path between S core core an D core_i, an the P is the path between the D core_i an estination noe. 4. If there is another estination noe. Go to step 2 6. else 7. Return P = Pv + Pcore + P 8. If a noe fault occurs 9. Sets all links connecting to the noe are faile. If all links are recovere, then one. else 12. Go to step 2 1. Done Domination fault recovery algorithm Input: MDS, NDS, CRT an NCRT Output: CRT an NCRT 1. If fault occurs 2. Executes the RSOMMC algorithm 3. Execute the ynamic core-base selection (DCS) algorithm to upate the MDS an NDS 4. Each core noe upates the CRT. Each non-core noe upates the NCRT 6. Done Link failure Base on the Fig. 2, a minimum spanning tree with minimum hop counts for multicast session tree is establishe, noe 2 is the source noe an noes 9, 12, an 14 are estination noes. If the link 6- is cut an the affecte estination noes are noes 9 an 14, the source noe of the faile link is noe 6 an the recovery path of source noe to affecte estination noes can be obtaine base on P = Pv + Pcore + P, which is shown Fig k = k =3 6 k =4 12 k =1 Source = {2} Destinations = {9,12,14} MDS = {2,7, } NDS = {3,,,} Fig. 3 Example of link failure Noe failure Base on the Fig. 2, if noe 6 is corrupte, the links 2-6, 1-6, -6, 6-, 6-, 6-7 are isconnecte an the affecte estination noes are 9 an 14. The parent noe of the faile noe is noe 2 an the recovery path of parent noe to affecte estination noes can be obtaine base on P = P + P + P, 7 8 v k 8 =2 core which is shown in Fig k = k =3 6 k =4 12 k =1 Source = {2} Destinations = {9,12,14} MDS = { 2,7, } NDS = {3,,,} Fig. 4 Example of noe failure 7 8 k 8 =2 IV. Performance Evaluation The performance of the propose algorithm is analyze by simulating the USANet (24 noes an 43 links), ChinaNet (39 noes an 72 links) an NTTNet (7 noes an 81 links) networks. In the experiments, each link inclues only one fiber on which 32 an 64 wavelength ata streams can be transmitte, incluing two wavelengths use as biirectional control channels an the conversion time of each converter is 1μs. Source noe an estination noes of multicast session are ranomly selecte, an the multicast group size (session size) is also ranomly assigne from the interval {6, 7,8}. Then, the minimum spanning tree (MST) approach is applie to construct the multicast tree for each multicast session. Multicast connection requests arrive accoring to a Poisson istribution λ = { 1,2,,} per minute, an their holing time is exponentially istribute (approximately a few minutes to hours). After the working tree is constructe for the multicast session, a single failure point (link failure or noe failure) for each multicast session is ranomly set in the multicast tree. Simulation programs are evelope using the OPNET an the performance of the propose algorithm herein is compare with those of the Dual Tree an MRLR algorithms in terms of the average hop count an blocking probability. The average hop count is efine as average hop count of all recovery paths per session an the blocking probability is efine as one or more restoration paths can not be establishe when fault occurs. a. Link failure Average hop count Figure shows the average hop count of link failure versus request rate with the ifferent numbers of channels for three ifferent algorithms in the USANet, ChinaNet, an NTTNet. The propose algorithm has the least average hop count neee than the other two algorithms for ifferent network topologies. Moreover, when the request rate is higher an the channel number is smaller, the average hop count of recovery paths of three algorithms are all increase. It is interesting to notice that the average hop count of recovery paths of the three algorithms are increase when the network topology is more complicate an has more protection paths can be chosen in the USANet. Dual tree protection nees to iscover fully isjoint paths; hence the hop count of each recovery path is larger than other algorithms. It can be also observe that the average hop count of the MRLR is ISBN: IMECS 9

5 Proceeings of the International MultiConference of Engineers an Computer Scientists 9 Vol I IMECS 9, March 18 -, 9, Hong Kong higher than the propose algorithm because the ring-base protection in some situations gets more hop count route even shorter paths exist (a) USANet Fig. 6 Blocking probability versus request rate with Figure 6 compares the blocking probability of link failure versus request rate with ifferent numbers of channels for three ifferent algorithms in the USANet, ChinaNet, an NTTNet. When the request rate is higher an the channel number is smaller, all the blocking probabilities of the three algorithms are increase. However, the blocking probabilities in all algorithms are improve when the network topology becomes complicate an more recovery paths can be chosen. Our propose algorithm has the lowest blocking probability compare to the other two algorithms an the blocking probability increases smoothly as the request rate is getting higher. b. Noe failure Average hop count (b) ChinaNet (b) USANet Fig. Average hop count versus request rate with Blocking probability (b)chinanet (a) USANet (b) ChinaNet Fig. 7 Average hop count versus request rate with Figure 7 shows the average hop count of noe failure versus request rate with the ifferent numbers of channels with three ifferent algorithms in the USANet, ChinaNet, an NTTNet. The simulation results of single noe fault are similar to link fault for ifferent network topologies an it have more hop counts than the link fault scenario. When the request rate is higher an the channel number is smaller, the average hop count of recovery paths of three algorithms are all increase. It is notice that the average hop count of recovery paths of the three algorithms increases when the network topology is more complicate an has more recovery paths can be chosen. Blocking probability Figure 8 compares the blocking probability of noe ISBN: IMECS 9

6 Proceeings of the International MultiConference of Engineers an Computer Scientists 9 Vol I IMECS 9, March 18 -, 9, Hong Kong failure versus request rate with ifferent numbers of channels with three ifferent algorithms in the USANet, ChinaNet, an NTTNet. It is similar to the link fault scenario that when the request rate is high an the channel number is small, all the blocking probabilities of the three algorithms are increase. The propose algorithm has the lowest blocking probability compare to the other two algorithms an the blocking probability is increase smoothly as the request rate is getting higher. It also shows that the propose algorithm still has stronger availability to hanle noe failure situations an higher scalability than other two algorithms (a) USANet (b) ChinaNet Fig. 8 Blocking probability versus request rate with V. Conclusion In this paper, we have propose a ynamic core-base selection (DCS) algorithm for one-to-many multicast traffic with minimum spanning tree in WDM mesh networks. The propose algorithm can provie the local recovery for link failure or noe failure base on the information from core noes. The simulation results show that the propose algorithm outperforms the ual tree an MRLR algorithm in terms of the average hop count of recovery path an blocking probability, especially in the complicate network topology. The propose algorithm is scalable to large-size mesh networks an can achieve high network survivability an reliability. Furthermore, when multiple faults occur, the propose algorithm also can provie fast recovery ability an further research is the extension of more efficient core noes selection scheme to satisfy the many-to-many multicast services. We believe that the propose work will meet the requirements of future networks for high performance, scalability an reliability. References [1] B. Mukherjee, WDM optical communication networks: progress an challenges, IEEE Journal on Selecte Areas in Communications, Vol. 18, Issue, pp , Oct.. [2] A. Karaman an H. Hassanein, Core-selection algorithms in multicast routing - comparative an complexity analysis, Computer Communications, Vol. 29, Issue 8, pp , May 6. [3] D. Waitzman, C. Partrige, an S. Deering, Distance vector multicast routing protocol, IETF RFC 7, Nov [4] A. Aams, J. Nicholas, an W. Siaak, Protocol inepenent multicast - ense moe (PIM-DM): Protocol specification (Revise), IETF RFC 3973, Jan.. [] J. Moy, Multicast extensions to OSPF, IETF RFC 184, Mar [6] A.M. Al-Sharafi, M. Othman, M.N. Sulaiman, an S. Subramaniam, Moifying the multicast tree in AMTree protocol using ranom core selection, International Conference on Computer an Communication Engineering 8, Kuala Lumpur, pp , -1 May 8. [7] B. Fenner, M. Hanley, H. Holbrook, an I. Kouvelas, Protocol inepenent multicast - sparse moe (PIM-SM): Protocol specification (Revise), IETF RFC 41, Aug. 6. [8] A. Karaman an H. Hassanein, QoS-constraine core selection for group communication, Computer Communications, Vol., Issue 7, pp , May 7. [9] A. Chakrabarti an G. Manimaran, A case for tree migration an integrate tree maintenance in QoS multicasting, Computer Communications, Vol. 26, Issue 9, pp. 7-17, June 3. [] A. Fei, J. Cui, M. Gerla, an D. Cavenish, A ual-tree scheme for fault-tolerant multicast, IEEE International Conference on Communications, Helsinki, Finlan, Vol. 3, pp , June 1. [] I.S. Hwang, R.Y. Cheng, an W.D. Tseng, A novel ynamic multiple ring-base local restoration for point-to-multipoint multicast traffic in WDM mesh networks, Photonic Network Communications, Vol. 14, No. 1, pp , Aug. 7. [12] G. Maier, A. Pattavina, S.D. Patre, an M. Martinelli, Optical network survivability: protection techniques in the WDM layer, Photonic Network Communications, Vol. 4, No. 3, pp , 2. [] A.F. Elrefaie, Multiwavelength survivable ring network architectures, IEEE International Conference on Communications, Geneva, Vol. 3, pp , May 23-26, [14] J. Tapolcai, P.H. Ho; D. Verchere, T. Cinkler, an A. Haque, A new share segment protection metho for survivable networks with guarantee recovery time, IEEE Transactions on Reliability, Vol. 7, No. 2, pp , June 8. [1] M. Mear, S.G. Finn, R.A. Barry, an R.G. Gallager, Reunant trees for preplanne recovery in arbitrary vertex-reunant or ege-reunant graphs, IEEE/ACM Transactions on Networking, Vol. 7, Issue, pp , Oct [16] C. Boworntummarat, L. Wuttisittikulkij, an S. Segkhoontho, Light-tree base protection strategies for multicast traffic in transport WDM mesh networks with multi-fiber systems, IEEE International Conference on Communications, Paris, France, Vol. 3, pp , June 4. [17] L. Guo, H. Yu, an L. Li, A new share-path protection algorithm uner share-risk link group constraints for survivable WDM mesh networks, Optics Communications, Vol. 246, Issue 4-6, pp , Feb.. [18] D. Xu, Y. Xiong, an C. Qiao, Novel algorithms for share segment protection, IEEE Journal on Selecte Areas in Communications, Vol. 21, Issue 8, pp. -31, Aug. 3. [19] L. Luhua, L. Lemin, an W. Sheng, Multicast protection scheme in survivable WDM optical networks, Journal of Network an Computer Applications, Vol. 31, Issue 3, pp , Dec. 6. ISBN: IMECS 9

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

A Novel High Performance Multicast Scheme on Virtual Ring-Based 2D Torus Topology in DWDM Networks

A Novel High Performance Multicast Scheme on Virtual Ring-Based 2D Torus Topology in DWDM Networks Tamkang Journal of Science and Engineering, Vol. 14, No. 1, pp. 81 89 (2011) 81 A Novel High Performance Multicast Scheme on Virtual Ring-Based 2D Torus Topology in DWDM Networks I-Shyan Hwang 1 *, San-Nan

More information

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

Multicast Routing : Computer Networking. Example Applications. Overview

Multicast Routing : Computer Networking. Example Applications. Overview Multicast outing 5-744: Computer Networking Unicast: one source to one estination Multicast: one source to many estinations Two main functions: Efficient ata istribution Logical naming of a group L-0 Multicast

More information

Candidate-Cycle-based Heuristic Algorithm for Node-and-Link Protection of Dynamic Multicast Traffic in Optical DWDM Networks

Candidate-Cycle-based Heuristic Algorithm for Node-and-Link Protection of Dynamic Multicast Traffic in Optical DWDM Networks Candidate-Cycle-based Heuristic Algorithm for Node-and-Link Protection of Dynamic Multicast Traffic in Optical DWDM Networks Ahmed Frikha, Samer Lahoud, and Bernard Cousin University of Rennes 1, IRISA,

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University

More information

Enhancement of the CBT Multicast Routing Protocol

Enhancement of the CBT Multicast Routing Protocol Enhancement of the CBT Multicast Routing Protocol Seok Joo Koh and Shin Gak Kang Protocol Engineering Center, ETRI, Korea E-mail: sjkoh@pec.etri.re.kr Abstract In this paper, we propose a simple practical

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun

More information

Performance of Optical Burst Switching Techniques in Multi-Hop Networks

Performance of Optical Burst Switching Techniques in Multi-Hop Networks Performance of Optical Switching Techniques in Multi-Hop Networks Byung-Chul Kim *, You-Ze Cho *, Jong-Hyup Lee **, Young-Soo Choi **, and oug Montgomery * * National Institute of Standards and Technology,

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Distributed Clustering Method for Large-Scaled Wavelength Routed Networks

Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Yukinobu Fukushima Graduate School of Information Science and Technology, Osaka University - Yamadaoka, Suita, Osaka 60-08, Japan

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

MODULE VII. Emerging Technologies

MODULE VII. Emerging Technologies MODULE VII Emerging Technologies Computer Networks an Internets -- Moule 7 1 Spring, 2014 Copyright 2014. All rights reserve. Topics Software Define Networking The Internet Of Things Other trens in networking

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:

More information

Burst Routing Planning for Optical Networks using the Association Rule Approach

Burst Routing Planning for Optical Networks using the Association Rule Approach IJCSNS International Journal of Computer Science and Network Security, VOL.6 No., October 2006 173 Burst Routing Planning for Optical Networks using the Association Rule Approach I-Shyan Hwang, Chaochang

More information

Enhanced Cores Based Tree for Many-to-Many IP Multicasting

Enhanced Cores Based Tree for Many-to-Many IP Multicasting Enhanced Cores Based Tree for Many-to-Many IP Multicasting In this paper, we propose a simple and practical scheme for many-to-many IP multicasting. The proposed scheme is based on the core based tree

More information

Overview : Computer Networking. IEEE MAC Protocol: CSMA/CA Internet mobility TCP over noisy links

Overview : Computer Networking. IEEE MAC Protocol: CSMA/CA Internet mobility TCP over noisy links Overview 15-441 15-441: Computer Networking 15-641 Lecture 24: Wireless Eric Anerson Fall 2014 www.cs.cmu.eu/~prs/15-441-f14 Internet mobility TCP over noisy links Link layer challenges an WiFi Cellular

More information

Virtual Source-Based Minimum Interference Path Multicast Routing with Differentiated QoS Guarantees in the Next Generation Optical Internet

Virtual Source-Based Minimum Interference Path Multicast Routing with Differentiated QoS Guarantees in the Next Generation Optical Internet Virtual Source-Based Minimum Interference Path Multicast Routing with Differentiated QoS Guarantees in the Next Generation Optical Internet Suk-Jin Lee 1, Kyung-Dong Hong 1, Chun-Jai Lee 1, Moon-Kyun Oh

More information

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting

More information

Delayed reservation decision in optical burst switching networks with optical buffers

Delayed reservation decision in optical burst switching networks with optical buffers Delayed reservation decision in optical burst switching networks with optical buffers G.M. Li *, Victor O.K. Li + *School of Information Engineering SHANDONG University at WEIHAI, China + Department of

More information

Spare Capacity Planning Using Survivable Alternate Routing for Long-Haul WDM Networks

Spare Capacity Planning Using Survivable Alternate Routing for Long-Haul WDM Networks Spare Capacity Planning Using Survivable lternate Routing for Long-Haul WDM Networks in Zhou an Hussein T. Mouftah Department of lectrical an Computer ngineering Queen s University, Kingston, Ontario,

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Image Segmentation using K-means clustering and Thresholding

Image Segmentation using K-means clustering and Thresholding Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

A Modified Heuristic Approach of Logical Topology Design in WDM Optical Networks

A Modified Heuristic Approach of Logical Topology Design in WDM Optical Networks Proceedings of the International Conference on Computer and Communication Engineering 008 May 3-5, 008 Kuala Lumpur, Malaysia A Modified Heuristic Approach of Logical Topology Design in WDM Optical Networks

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Why multicast? The concept of multicast Multicast groups Multicast addressing Multicast routing protocols MBONE Multicast applications Conclusions

Why multicast? The concept of multicast Multicast groups Multicast addressing Multicast routing protocols MBONE Multicast applications Conclusions Tuomo Karhapää tuomo.karhapaa@otaverkko.fi Otaverkko Oy Why multicast? The concept of multicast Multicast groups Multicast addressing Multicast routing protocols MBONE Multicast applications Conclusions

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM International Journal of Physics an Mathematical Sciences ISSN: 2277-2111 (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao

More information

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT

More information

Enhancement of the CBT Multicast Routing Protocol

Enhancement of the CBT Multicast Routing Protocol Enhancement of the CBT Multicast Routing Protocol Seok Joo Koh and Shin Gak Kang Protocol Engineering Center, ETRI, Korea E- mail: sj ko h @ pcc.c t ri.rc.k Abstract In this paper, we propose a simple

More information

Multicast routing Draft

Multicast routing Draft Multicast routing Draft Lucia Tudose Nokia Research Center E-mail: tudose@research.nokia.com Abstract Multicast routing is establishing a tree which is routed from the source node and contains all the

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 0 0 0 0 0 0 0 0 on-uniform Sensor Deployment in Mobile Wireless Sensor etworks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University Boca Raton,

More information

Multicast Communications

Multicast Communications Multicast Communications Multicast communications refers to one-to-many or many-tomany communications. Unicast Broadcast Multicast Dragkedja IP Multicasting refers to the implementation of multicast communication

More information

d 3 d 4 d d d d d d d d d d d 1 d d d d d d

d 3 d 4 d d d d d d d d d d d 1 d d d d d d Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching

More information

Performance Assessment and Comparison between Star-ring based and Tree based EPONs

Performance Assessment and Comparison between Star-ring based and Tree based EPONs Performance Assessment and Comparison between Star-ring based and Tree based EPONs Zen-Der Shyu 1 Department of General Education, Army Academy, Taiwan I-Shyan Hwang 2,3, Chun-Wei Huang 3, and I-Cheng

More information

Spare Capacity Allocation Using Partially Disjoint Paths for Dual Link Failure Protection

Spare Capacity Allocation Using Partially Disjoint Paths for Dual Link Failure Protection Spare Capacity Allocation Using Partially Disjoint Paths for Dual Link Failure Protection Victor Yu Liu Network Advanced Research, Huawei Technologies Santa Clara, California, USA yuliu@ieee.org Abstract

More information

Dynamic service Allocation with Protection Path

Dynamic service Allocation with Protection Path www.ijcsi.org 115 Dynamic service Allocation with Protection Path Loay Alzubaidi Department of Computer Engineering & Science, Prince Muhammad bin Fahd University AL-Khobar, Saudi Arabia Abstract Path

More information

An Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks

An Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks An Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks Timothy Hahn, Shen Wan March 5, 2008 Montana State University Computer Science Department Bozeman,

More information

Automatic Service and Protection Path Computation - A Multiplexing Approach

Automatic Service and Protection Path Computation - A Multiplexing Approach Automatic Service and Protection Path Computation - A Multiplexing Approach Loay Alzubaidi 1, Ammar El Hassan 2, Jaafar Al Ghazo 3 1 Department of Computer Engineering & Science, Prince Muhammad bin Fahd

More information

PAPER. 1. Introduction

PAPER. 1. Introduction IEICE TRANS. COMMUN., VOL. E9x-B, No.8 AUGUST 2010 PAPER Integrating Overlay Protocols for Proviing Autonomic Services in Mobile A-hoc Networks Panagiotis Gouvas, IEICE Stuent member, Anastasios Zafeiropoulos,,

More information

Optical Communications and Networking 朱祖勍. Nov. 27, 2017

Optical Communications and Networking 朱祖勍. Nov. 27, 2017 Optical Communications and Networking Nov. 27, 2017 1 What is a Core Network? A core network is the central part of a telecommunication network that provides services to customers who are connected by

More information

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita

More information

Available online at ScienceDirect

Available online at   ScienceDirect Available online at www.sciencedirect.com ScienceDirect Procedia Technology 0 ( 0 ) 900 909 International Conference on Computational Intelligence: Modeling, Techniques and Applications (CIMTA-0) Multicast

More information

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks Hinawi Publishing Corporation International Journal of Distribute Sensor Networks Volume 2014, Article ID 936379, 17 pages http://x.oi.org/10.1155/2014/936379 Research Article REALFLOW: Reliable Real-Time

More information

Progress Report No. 15. Shared Segments Protection

Progress Report No. 15. Shared Segments Protection NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 15 Shared Segments Protection The University of Canterbury Team 18 April 2006 Abstract As a complement to the Canterbury

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks Provisioning Virtualize Clou Services in IP/MPLS-over-EON Networks Pan Yi an Byrav Ramamurthy Department of Computer Science an Engineering, University of Nebraska-Lincoln Lincoln, Nebraska 68588 USA Email:

More information

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance International Journal of Moern Communication Technologies & Research (IJMCTR) Impact of FTP Application file size an TCP Variants on MANET Protocols Performance Abelmuti Ahme Abbasher Ali, Dr.Amin Babkir

More information

Diversity Coded 5G Fronthaul Wireless Networks

Diversity Coded 5G Fronthaul Wireless Networks IEEE Wireless Telecommunication Symposium (WTS) 2017 Diversity Coded 5G Fronthaul Wireless Networks Nabeel Sulieman, Kemal Davaslioglu, and Richard D. Gitlin Department of Electrical Engineering University

More information

Multi-layer Network Recovery: Avoiding Traffic Disruptions Against Fiber Failures

Multi-layer Network Recovery: Avoiding Traffic Disruptions Against Fiber Failures Multi-layer Network Recovery: Avoiding Traffic Disruptions Against Fiber Failures Anna Urra, Eusebi Calle, and Jose L. Marzo Institute of Informatics and Applications (IIiA), University of Girona, Girona

More information

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach Nishi Sharma, Vanna Verma Abstract Wireless sensor networks (WSNs) is one of the emerging fiel of research in recent era

More information

On the Placement of Internet Taps in Wireless Neighborhood Networks

On the Placement of Internet Taps in Wireless Neighborhood Networks 1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that

More information

An Algorithm for Traffic Grooming in WDM Mesh Networks with Dynamically Changing Light-Trees

An Algorithm for Traffic Grooming in WDM Mesh Networks with Dynamically Changing Light-Trees An Algorithm for raffic rooming in WDM Mesh Networks with Dynamically Changing Light-rees Xiaodong Huang, Farid Farahmand, and Jason P. Jue Department of Computer Science Department of Electrical Engineering

More information

Category: Informational Woven Systems May 2008

Category: Informational Woven Systems May 2008 Network Working Group Request for Comments: 5186 Category: Informational B. Haberman Johns Hopkins University J. Martin Woven Systems May 2008 Internet Group Management Protocol Version 3 (IGMPv3) / Multicast

More information

Application-Aware Protection in DWDM Optical Networks

Application-Aware Protection in DWDM Optical Networks Application-Aware Protection in DWDM Optical Networks Hamza Drid, Nasir Ghani, Bernard Cousin To cite this version: Hamza Drid, Nasir Ghani, Bernard Cousin. Application-Aware Protection in DWDM Optical

More information

Distributed Clustering Method for Large-Scaled Wavelength Routed Networks

Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Yukinobu Fukushima, Hiroaki Harai, Shin ichi Arakawa, and Masayuki Murata Graduate School of Information Science and Technology,

More information

Adaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks

Adaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks Adaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks Tibor Fabry-Asztalos, Nilesh Bhide and Krishna M. Sivalingam School of Electrical Engineering &

More information

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients Probabilistic Meium Access Control for 1 Full-Duplex Networks with Half-Duplex Clients arxiv:1608.08729v1 [cs.ni] 31 Aug 2016 Shih-Ying Chen, Ting-Feng Huang, Kate Ching-Ju Lin, Member, IEEE, Y.-W. Peter

More information

Multicast OLSP Establishment Scheme in OVPN over IP/GMPLS over DWDM

Multicast OLSP Establishment Scheme in OVPN over IP/GMPLS over DWDM Multicast OLSP Establishment Scheme in OVPN over IP/GMPLS over DWDM Jeong-Mi Kim 1, Oh-Han Kang 2, Jae-Il Jung 3, and Sung-Un Kim 1,4 1 Pukyong National University, 599-1 Daeyeon 3-Dong Nam-Gu, Busan,

More information

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

Wavelength Assignment in a Ring Topology for Wavelength Routed WDM Optical Networks

Wavelength Assignment in a Ring Topology for Wavelength Routed WDM Optical Networks Wavelength Assignment in a Ring Topology for Wavelength Routed WDM Optical Networks Amit Shukla, L. Premjit Singh and Raja Datta, Dept. of Computer Science and Engineering, North Eastern Regional Institute

More information

Lab work #8. Congestion control

Lab work #8. Congestion control TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño

More information

Efficient path protection using Bi-directional WDM transmission technology. Title

Efficient path protection using Bi-directional WDM transmission technology. Title Title Efficient path protection using Bi-directional WDM transmission technology Author(s) Li, J; Yeung, KL Citation Globecom - Ieee Global Telecommunications Conference, 2005, v. 4, p. 1910-1914 Issued

More information

A Novel Optimization Method of Optical Network Planning. Wu CHEN 1, a

A Novel Optimization Method of Optical Network Planning. Wu CHEN 1, a A Novel Optimization Method of Optical Network Planning Wu CHEN 1, a 1 The engineering & technical college of chengdu university of technology, leshan, 614000,china; a wchen_leshan@126.com Keywords:wavelength

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Toward the joint design of electronic and optical layer protection

Toward the joint design of electronic and optical layer protection Toward the joint design of electronic and optical layer protection Massachusetts Institute of Technology Slide 1 Slide 2 CHALLENGES: - SEAMLESS CONNECTIVITY - MULTI-MEDIA (FIBER,SATCOM,WIRELESS) - HETEROGENEOUS

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

Splitter Placement in All-Optical WDM Networks

Splitter Placement in All-Optical WDM Networks plitter Placement in All-Optical WDM Networks Hwa-Chun Lin Department of Computer cience National Tsing Hua University Hsinchu 3003, TAIWAN heng-wei Wang Institute of Communications Engineering National

More information

6.823 Computer System Architecture. Problem Set #3 Spring 2002

6.823 Computer System Architecture. Problem Set #3 Spring 2002 6.823 Computer System Architecture Problem Set #3 Spring 2002 Stuents are strongly encourage to collaborate in groups of up to three people. A group shoul han in only one copy of the solution to the problem

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

ETSF10 Internet Protocols Routing on the Internet

ETSF10 Internet Protocols Routing on the Internet ETSF10 Internet Protocols Routing on the Internet 2013, Part 2, Lecture 1.2 Jens Andersson (Kaan Bür) Routing on the Internet Unicast routing protocols (part 2) [ed.5 ch.20.3] Multicast routing, IGMP [ed.5

More information

Packet Rescheduling in Real-Time Using Token-passing Protocol in WDM Ring Access Networks

Packet Rescheduling in Real-Time Using Token-passing Protocol in WDM Ring Access Networks Tamkang Journal of Science and Engineering, Vol. 9, No 2, pp. 107 114 (2006) 107 Packet Rescheduling in Real-Time Using Token-passing Protocol in WDM Ring Access Networks I-Shyan Hwang*, San-Nan Lee and

More information

Dynamic Wavelength Assignment for WDM All-Optical Tree Networks

Dynamic Wavelength Assignment for WDM All-Optical Tree Networks Dynamic Wavelength Assignment for WDM All-Optical Tree Networks Poompat Saengudomlert, Eytan H. Modiano, and Robert G. Gallager Laboratory for Information and Decision Systems Massachusetts Institute of

More information

Establishment of Survivable Connections in WDM Networks using Partial Path Protection

Establishment of Survivable Connections in WDM Networks using Partial Path Protection Establishment of Survivable Connections in WDM Networks using Partial Path Protection G. Xue 1, Senior Member, IEEE, W. Zhang 1,J.Tang 1, and K. Thulasiraman 2, Fellow, IEEE Abstract As a generalization

More information

A New Multicast Wavelength Assignment Algorithm in Wavelength-Converted Optical Networks

A New Multicast Wavelength Assignment Algorithm in Wavelength-Converted Optical Networks Int J Communications, Network and System Sciences, 2009, 2, 912-916 doi:104236/ijcns200929106 Published Online December 2009 (http://wwwscirporg/journal/ijcns/) A New Multicast Waelength Assignment Algorithm

More information

A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks

A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks Wojciech Molisz and Jacek Rak Gdansk University of Technology, G. Narutowicza 11/12, Pl-8-952 Gdansk, Poland

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Applying p-cycle Protection Approach for a Reliable IPTV Service in IP-over-DWDM Networks

Applying p-cycle Protection Approach for a Reliable IPTV Service in IP-over-DWDM Networks Frikha et al. RESEARCH Applying p-cycle Protection Approach for a Reliable IPTV Service in IP-over-DWDM Networks Ahmed Frikha *, Bernard Cousin and Samer Lahoud Abstract Today, IPTV service has become

More information

Supporting Fully Adaptive Routing in InfiniBand Networks

Supporting Fully Adaptive Routing in InfiniBand Networks XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,

More information

Learning Subproblem Complexities in Distributed Branch and Bound

Learning Subproblem Complexities in Distributed Branch and Bound Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University

More information

Performance analysis of realistic optical time division multiplexed wavelength routed networks. Creative Commons: Attribution 3.0 Hong Kong License

Performance analysis of realistic optical time division multiplexed wavelength routed networks. Creative Commons: Attribution 3.0 Hong Kong License Title Performance analysis of realistic optical time division multiplexed wavelength routed networks Author(s) Li, CY; Li, G; Wai, PKA; Li, VOK Citation The 8th IEEE Annual Workshop on Computer Communications

More information

Fault Tolerant System for Sparse Traffic Grooming in Optical WDM Mesh Networks Using Combiner Queue

Fault Tolerant System for Sparse Traffic Grooming in Optical WDM Mesh Networks Using Combiner Queue Fault Tolerant System for Sparse Traffic Grooming in Optical WDM Mesh Networks Using Combiner Queue Sandip R. Shinde Research Scholar, Sathyabama University, Chennai & Assistant Professor, Vishwakarma

More information

A Stochastic Process on the Hypercube with Applications to Peer to Peer Networks

A Stochastic Process on the Hypercube with Applications to Peer to Peer Networks A Stochastic Process on the Hypercube with Applications to Peer to Peer Networs [Extene Abstract] Micah Aler Department of Computer Science, University of Massachusetts, Amherst, MA 0003 460, USA micah@cs.umass.eu

More information

Routing and quality of service support for mobile ad hoc networks

Routing and quality of service support for mobile ad hoc networks Computer Networks 51 (2007) 3142 3156 www.elsevier.com/locate/comnet Routing an quality of service support for mobile a hoc networks Anelise Munaretto a,c, *, Mauro Fonseca b,c a CPGEI/UTFPR, Programa

More information

Principles of B-trees

Principles of B-trees CSE465, Fall 2009 February 25 1 Principles of B-trees Noes an binary search Anoe u has size size(u), keys k 1,..., k size(u) 1 chilren c 1,...,c size(u). Binary search property: for i = 1,..., size(u)

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS

ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS Ching-Lung Chang, Yan-Ying, Lee, and Steven S. W. Lee* Department of Electronic Engineering, National

More information