One-to-Many Multicast Restoration Based on Dynamic Core-Based Selection Algorithm in WDM Mesh Networks
|
|
- Della Jordan
- 5 years ago
- Views:
Transcription
1 Proceeings of the International MultiConference of Engineers an Computer Scientists 9 Vol I IMECS 9, March 18 -, 9, Hong Kong One-to-Many Multicast Restoration Base on Dynamic Core-Base Selection Algorithm in WDM Mesh Networks I-Shyan Hwang, *San-Nan Lee, Zen-Der Shyu an Kang-Peng Chen Abstract-This paper proposes a novel ynamic core-base selection (DCS) algorithm for the multicast restoration in WDM mesh networks. The core-base fault tolerance scheme provies a flexible way to control a number of core noes with less control overheas for searching the routing path, wavelength assignment (RWA) an restoration paths when fault occurs in the one-to-many multicast omain. Compare with the source-base scheme, core-base schemes are easier to maintain, an specifically scalable in large-scale topologies. In the core-base fault tolerance scheme, k-tuple omination noes are selecte to form a minimum size vertex subset such that each vertex in the graph is ominate by at least k vertices, where the k is efine as two in this paper. The propose DCS algorithm is efine as each noe in multicast tree session must be irectly connecte to at least one core noe in multicast tree session an also has to be irectly connecte to at least one core noe out of multicast tree session. The primary aim of this work is to provie the scalable an fast local survivability base on the information from core noes. Simulation results show that the propose algorithm outperforms the Dual Tree an MRLR algorithms in terms of total hop counts neee for all recovery paths an blocking probability for ifferent network topologies. Keywors: DCS, Multicast restoration, Local survivability, Dual Tree, MRLR. I. Introuction Optical networks with Dense Wavelength Division Multiplex (DWDM) can provie multiple ata channels to supply high spee, high capacity to perform banwith-intensive multicast transmission service [1] technology, which uses wavelength ivision, markely increases the banwith of existing optical fiber networks. Multicasting is the simultaneous elivery of ata stream from one or more sources to multiple receivers by using one or more tree-base structures in the network. The benefit of multicast is that the source sens a single copy to the entire estinations, such that multicast can utilize banwith efficiency. In general, the one-to-many multicast routing algorithm can be classifie as source-base moe an core-base moe. In source-base moe, multicast tree roote at the source noe an connecte to each member in the multicast session [2]. Then, ata packets originating from I-Shyan Hwang is a professor in the Department of Computer Science & Engineering at the Yuan-Ze University, Chung-Li, Taiwan (ishwang@saturn.yzu.eu.tw). San-Nan Lee is a assistant professor in the Department of Computer Science an Information Engineering at Vanung University, Chung-Li, Taiwan (Tel: ~727, Fax: ~7, gran@vnu.eu.tw). Zen-Der Shyu is currently pursuing the Ph. D egree at the Yuan-Ze University. Since 199, he serve as an instructor in the Army Acaemy R.O.C. Kang-Peng Chen receive M.S. egree in Department of Computer Science an Engineering from the Yuan-Ze University, Chung-Li, Taiwan in 8. the source noe are sent to all the estination noes via the links of multicast tree. The Distance Vector Multicast Routing Protocol (DVMRP) [3] is a ense moe routing protocol which has goo performance in network environments with high banwith an ensely istribute multicast session members. In heterogeneous Internet environment, it potentially has to support many thousans of multicast groups, each of which may be sparsely istribute, so this technique oes not scale well. The Protocol Inepenent Multicast-Dense Moe (PIM-DM) [4] is an efficient protocol when most receivers are intereste in the multicast ata, but oes not scale well across larger omains in which most receivers are not intereste in the ata. The main ifference between DVMRP an PIM-DM is that the PIM-DM introuces the concept of protocol inepenence such that any unerlying unicast routing protocol to perform reverse path forwaring checks. The Multicast Open Shortest Path First (MOSPF) [] is an extension to the Open Shortest Path First (OSPF) protocol to support multicast routing an allows routers to share information about group memberships. In core-base moe, some noes for each group are selecte as the core noes an multicast tree roote at core noe an constructe to span all the group members. Data packets flow from any source to its parent an chilren, such as Core-base Tree (CBT) [6] an Protocol Inepenent Multicast-Sparse Moe (PIM-SM) [7]. The CBT may buil one or multiple core-base biirectional trees which are share by all of the group's seners an receivers with core noe selection algorithm. However, the traffic may be concentrate at core noes, the scalability an more management cost shoul be consiere. The PIM-SM is an efficient routing protocol to multicast groups that span all estinations istribute sparsely in inter-omain network environment. The core-base scheme is preferable to source-base for multiple sources in the multicast group. The avantage of core-base scheme has less control overhea of a single share tree rather than multiple trees. Recent researches in core-base scheme focus on the multi-core selection by k-center or r-ominating in multicast trees [8]. Core noe selection algorithms can be classifie as (1) one core noe, an (2) multiple core noes selection [9]. The rest of this paper is organize as follows. Section II escribes relate work of survivability scheme in multicast. Next, Section III proposes a novel ynamic core-base selection (DCS) algorithm for one-to-many multicast restoration in WDM mesh networks, which is capable of proviing overall protection for optical noes an fibers. Section IV compares the system performance of the propose algorithm with the Dual Tree [] an Multiple Ring-base Local Restoration (MRLR) [] algorithms in terms of total hop counts neee for all ISBN: IMECS 9
2 Proceeings of the International MultiConference of Engineers an Computer Scientists 9 Vol I IMECS 9, March 18 -, 9, Hong Kong recovery paths an blocking probability for ifferent network topologies. Finally, conclusions are rawn in Section V. II. Multicast Fault Tolerance With the intensive banwith in DWDM optical fibers, a network function failure, such as network equipment corrupte or fiber cut, will cause serious ata loss. For protecting multicast session against failure, network survivability must be consiere in esigning DWDM networks. The light-tree protection for multicast has more challenging than the unicast in optical networks, since a link or a noe failure will affect several estinations at the same time. So keeping multicast session functionally nees a heuristic proceure an the objective is to achieve high reliability an fast recoveries with minimum backup resource an cost in the multicasting scheme. The preplanne fault tolerance with backup rerouting algorithm can provie fast recovery time, an it is suitable for one-to-many multicast with ifferent backup structures belonging to the reuce topology which incluing a set of backup paths to minimize the multicast tree cost after recovery. There are three categories in multicast fault tolerance schemes as shown in Fig. 1. Fig. 1 Three categories of multicast fault tolerance algorithms. Ring-base protection: Ring-base protection has been part of the transport network lanscape for some time ue to the wie eployment of ring network topologies. The first mesh-ring ecomposition is known as the noe cover [12], in which the set of rings is selecte such that each noe belongs to one or more rings an each link belongs to no more than one ring. A noe cover oes not necessarily cover all the links an the uncovere links remain unprotecte. This problem can be eliminate using the ring cover []. Each link must belong to at least one ring an all links are protecte, however, spare resources may be reunant. Unfortunately, eciing the minimal ring cover in non-planar networks is an NP-har problem an is not scalable. This type of algorithm can, therefore, recover quickly from failures an etermine how to allocate recovere traffic loas base on current traffic loa an the network banwith along the restoration paths. Tree-base protection: Link protection an path protection [14] are parts of the tree-base protection. The link protection is to fin a backup link between noes, but it causes a huge cost an waste banwith. The path protection establishes a isjoint path between each source-estination pair. The reunant tree protection is propose in [1] to establish a new multicast tree from original source to the estination noes bypassing the existing tree noes. In ual tree protection [], affecte leaf noes are connecte to an unaffecte leaf noe. It requires that the unerlying network topology is a bi-connecte graph, in which there are at least two vertex-isjoint or link-isjoint paths between any two noes. Four multicast tree fault tolerance schemes are propose in [16], namely, Group-base protection: The concept of Share Risk Link Group (SRLG) [17] is a group of network links that share a common physical resource. After an initial failure an before reprovisioning, it cannot support restoration for aitional failures to other light-paths in the same restoration group. Therefore, two or more working paths uner the same failure risk cannot share the same protection resource. The Share Banwith Assignment (SBA) [18] provies the ability using integer linear programming to allocate banwith an fin backup segments by ynamic programming when several multicast working paths sharing the common backup path. The Share Segment Protection with Reprovisioning (SSPR) [19] is similar to the SRLG that the SSPR can provie ual links fault tolerance an increase the banwith utilization. The propose ynamic core-base selection (DCS) algorithm is efine as each noe in multicast tree session must be irectly connecte to at least one core noe in multicast tree session an also has to be irectly connecte to at least one core noe out of multicast tree session. The DCS algorithm is extene to core noes selection which prouces the core-base tree to enhance restoration ability. III. Propose Algorithm In general, fining the k-tuple ominating set (k-ds) of a graph G = { V, E }, where noes set V = { v,, 1 v m } with m noes an links set E = { e1,, en } with n links, that ominates the multicast tree noes in a subset of core noes S, where S V, such that each noe in the subset V \ S is ajacent to at least k core noes in S. The value of k is given by two in this paper. The propose ynamic core-base selection (DCS) algorithm is efine as each noe in multicast tree session must be connecte to at least one core noe in multicast tree session an also the noe has to be connecte to one core noe out of multicast tree session. Each core noe has a core routing table (CRT) which recors the information between current core noe an other core noes, such as hop counts, available wavelengths, an the ominating noes of the current core noe. The available wavelength is use to gather wavelengths usage statistic for each link of recovery path. In aition, each non-core noe in multicast session has a non-core routing table (NCRT) which recors the information of its ominate core noes in terms of available wavelengths. Both tables are broacaste through control channels perioically to other noes for upating the information base on the network status. ISBN: IMECS 9
3 Proceeings of the International MultiConference of Engineers an Computer Scientists 9 Vol I IMECS 9, March 18 -, 9, Hong Kong The propose DCS algorithm is a istribute core selection algorithm which has two subsets: (1) multicast session member ominating set (MDS), (2) non-multicast session member ominating set (NDS). In such a way, each noe in one-to-many multicast session will be ominate at least twice to enhance the restoration ability. Both MDS an NDS are establishe by the DCS algorithm an shown as follows: Dynamic core-base selection (DCS) algorithm Input: Multicast session tree T, network topology Output: MDS an NDS 1. Initialize the MDS={s}, where s is root 2. All parent noes of leaf noes in T are ae to MDS 3. Delete leaf noes an parent noes of leaf noes, an then form new sub tree T 4. If T is not null. Go to Step 2 6. Calculate K={k 1,,k i }, where k i is the number of connections noe i in non-multicast session to the members in multicast session with one hop 7. The noe which has the maximal egree in K is ae to NDS 8. If all multicast session members are ominate by core noes in NDS or no one can be ominate 9. Done. else Go to Step k = k =3 6 k =4 12 k =1 Source = {2} Destinations = {9,12,14} MDS = {2,7, } NDS = {3,,,} 7 8 k 8 =2 Fig. 2 Example of the MDS an NDS The MDS is efine as each noe in the multicast session is ominate at least once by core noes resie in multicast session. Initially, the root noe of multicast session as the source noe is assume to be a core noe, an then fins the core noes from multicast leaf noes to the source noe, recursively. First, the parent noes of leaf noes are chosen as core noes an the leaf noes an parent noes of the chosen core noes are elete to form a new sub tree. This process is to make sure that each noe can be ominate once by core noes. Base on the new sub tree, the parent noes of the new leaf noes are chosen as core noes an the new leaf noes an parent noes of the chosen core noes are elete to form another new sub tree. Repeating the process until the source noe or null noe is left. For example, shown in Fig. 2. The NDS is efine as each noe in multicast session has at least once ominate by core noes from non-multicast session. The selection of core noe from non-multicast session is base on the connectivity for the noes in non-multicast session to the multicast session. Given K = { k1,..., k i }, where k i is the number of connections from noe i in non-multicast session to the members in multicast session with one hop. After calculating the K = { k1,..., k i } of each noe in non-multicast session to the multicast session, the noe with maximum k i is chosen as a core noe. Repeating the process until all multicast session members are ominate or no other core noes can be ominate. For example, shown in Fig. 2, calculating the k i of all noes in non-multicast session to the multicast session, e.g., noe have the k of 4, noe has the k of 3, noe 16 has k 16 of 1 an noe 4 has k 4 of, the other noes have the k, where i = { 1,3,8,,1} of 2. i Then, the noe with k of 4 is chosen as a core noe which can ominate the noes 6, 7, an 12; the noe with k of 3 is chosen as another core noe which can ominate the noes 6, 9 an ; the noe 3 with k 3 of 2 is chosen as a core noe which can ominate the noes 2 an 7, an noe with k of 2 is chosen as a core noe to ominate noes 9 an 14. Then, the NDS inclues noes 3,, an. A restoration scheme for one-to-many multicast communication (RSOMMC) algorithm to resolve the noe or link faults is propose in this session. When fault occurs, the upstream noe u, where u T, ajacent to the faile link or the faile noe will broacast the failure type an location, an etermine which estination noe(s) is affecte base on the CRT from S core or itself if the noe u is a core noe. Each affecte estination noe nees to fin the recovery paths P with minimum hop counts base on the following equation: P = Pv + Pcore + P, where P is the path from upstream noe of the faile v link or the parent noe of the faile noe to the ominating core noe, S core, P core is the path between the ominating core noe, S core, near the fault an core noe ominates the affecte estination noes, D core, an P is the path from the ominating core noe, D core to the affecte estination noes. The P v is null when the upstream noe of the faile link or the parent noe of the faile noe v is a core noe. Noe fault can be seen as multiple links fault an tries to fin the path from the upstream noe of the faile link or the parent noe of the faile noe to each estination noe iniviually. The propose algorithm can maintain multicast session an choose the minimum hop count to be P core. Once the P is etermine, core P v an P are also known then the recovery path is establishe. The pseuo coe of restoration scheme for one-to-many multicast communication (RSOMMC) for link failure or noe failure an the omination fault recovery scheme is escribe as follows: Restoration scheme for one-to-many multicast ISBN: IMECS 9
4 Proceeings of the International MultiConference of Engineers an Computer Scientists 9 Vol I IMECS 9, March 18 -, 9, Hong Kong communication (RSOMMC) Input: Core routing table (CRT), Non-core noe routing table (NCRT) Output: Recovery path 1. If a link fault occurs 2. The upstream noe of the faile link, u, fins the core noe S core that ominate the noe u, an core noe D core_i that ominates the affecte estination noes where i is the sequences of estination noes 3. Accoring the CRT an NCRT, the path P v is selecte from the source noe to S core base on the minimum hop counts, P is the path between S core core an D core_i, an the P is the path between the D core_i an estination noe. 4. If there is another estination noe. Go to step 2 6. else 7. Return P = Pv + Pcore + P 8. If a noe fault occurs 9. Sets all links connecting to the noe are faile. If all links are recovere, then one. else 12. Go to step 2 1. Done Domination fault recovery algorithm Input: MDS, NDS, CRT an NCRT Output: CRT an NCRT 1. If fault occurs 2. Executes the RSOMMC algorithm 3. Execute the ynamic core-base selection (DCS) algorithm to upate the MDS an NDS 4. Each core noe upates the CRT. Each non-core noe upates the NCRT 6. Done Link failure Base on the Fig. 2, a minimum spanning tree with minimum hop counts for multicast session tree is establishe, noe 2 is the source noe an noes 9, 12, an 14 are estination noes. If the link 6- is cut an the affecte estination noes are noes 9 an 14, the source noe of the faile link is noe 6 an the recovery path of source noe to affecte estination noes can be obtaine base on P = Pv + Pcore + P, which is shown Fig k = k =3 6 k =4 12 k =1 Source = {2} Destinations = {9,12,14} MDS = {2,7, } NDS = {3,,,} Fig. 3 Example of link failure Noe failure Base on the Fig. 2, if noe 6 is corrupte, the links 2-6, 1-6, -6, 6-, 6-, 6-7 are isconnecte an the affecte estination noes are 9 an 14. The parent noe of the faile noe is noe 2 an the recovery path of parent noe to affecte estination noes can be obtaine base on P = P + P + P, 7 8 v k 8 =2 core which is shown in Fig k = k =3 6 k =4 12 k =1 Source = {2} Destinations = {9,12,14} MDS = { 2,7, } NDS = {3,,,} Fig. 4 Example of noe failure 7 8 k 8 =2 IV. Performance Evaluation The performance of the propose algorithm is analyze by simulating the USANet (24 noes an 43 links), ChinaNet (39 noes an 72 links) an NTTNet (7 noes an 81 links) networks. In the experiments, each link inclues only one fiber on which 32 an 64 wavelength ata streams can be transmitte, incluing two wavelengths use as biirectional control channels an the conversion time of each converter is 1μs. Source noe an estination noes of multicast session are ranomly selecte, an the multicast group size (session size) is also ranomly assigne from the interval {6, 7,8}. Then, the minimum spanning tree (MST) approach is applie to construct the multicast tree for each multicast session. Multicast connection requests arrive accoring to a Poisson istribution λ = { 1,2,,} per minute, an their holing time is exponentially istribute (approximately a few minutes to hours). After the working tree is constructe for the multicast session, a single failure point (link failure or noe failure) for each multicast session is ranomly set in the multicast tree. Simulation programs are evelope using the OPNET an the performance of the propose algorithm herein is compare with those of the Dual Tree an MRLR algorithms in terms of the average hop count an blocking probability. The average hop count is efine as average hop count of all recovery paths per session an the blocking probability is efine as one or more restoration paths can not be establishe when fault occurs. a. Link failure Average hop count Figure shows the average hop count of link failure versus request rate with the ifferent numbers of channels for three ifferent algorithms in the USANet, ChinaNet, an NTTNet. The propose algorithm has the least average hop count neee than the other two algorithms for ifferent network topologies. Moreover, when the request rate is higher an the channel number is smaller, the average hop count of recovery paths of three algorithms are all increase. It is interesting to notice that the average hop count of recovery paths of the three algorithms are increase when the network topology is more complicate an has more protection paths can be chosen in the USANet. Dual tree protection nees to iscover fully isjoint paths; hence the hop count of each recovery path is larger than other algorithms. It can be also observe that the average hop count of the MRLR is ISBN: IMECS 9
5 Proceeings of the International MultiConference of Engineers an Computer Scientists 9 Vol I IMECS 9, March 18 -, 9, Hong Kong higher than the propose algorithm because the ring-base protection in some situations gets more hop count route even shorter paths exist (a) USANet Fig. 6 Blocking probability versus request rate with Figure 6 compares the blocking probability of link failure versus request rate with ifferent numbers of channels for three ifferent algorithms in the USANet, ChinaNet, an NTTNet. When the request rate is higher an the channel number is smaller, all the blocking probabilities of the three algorithms are increase. However, the blocking probabilities in all algorithms are improve when the network topology becomes complicate an more recovery paths can be chosen. Our propose algorithm has the lowest blocking probability compare to the other two algorithms an the blocking probability increases smoothly as the request rate is getting higher. b. Noe failure Average hop count (b) ChinaNet (b) USANet Fig. Average hop count versus request rate with Blocking probability (b)chinanet (a) USANet (b) ChinaNet Fig. 7 Average hop count versus request rate with Figure 7 shows the average hop count of noe failure versus request rate with the ifferent numbers of channels with three ifferent algorithms in the USANet, ChinaNet, an NTTNet. The simulation results of single noe fault are similar to link fault for ifferent network topologies an it have more hop counts than the link fault scenario. When the request rate is higher an the channel number is smaller, the average hop count of recovery paths of three algorithms are all increase. It is notice that the average hop count of recovery paths of the three algorithms increases when the network topology is more complicate an has more recovery paths can be chosen. Blocking probability Figure 8 compares the blocking probability of noe ISBN: IMECS 9
6 Proceeings of the International MultiConference of Engineers an Computer Scientists 9 Vol I IMECS 9, March 18 -, 9, Hong Kong failure versus request rate with ifferent numbers of channels with three ifferent algorithms in the USANet, ChinaNet, an NTTNet. It is similar to the link fault scenario that when the request rate is high an the channel number is small, all the blocking probabilities of the three algorithms are increase. The propose algorithm has the lowest blocking probability compare to the other two algorithms an the blocking probability is increase smoothly as the request rate is getting higher. It also shows that the propose algorithm still has stronger availability to hanle noe failure situations an higher scalability than other two algorithms (a) USANet (b) ChinaNet Fig. 8 Blocking probability versus request rate with V. Conclusion In this paper, we have propose a ynamic core-base selection (DCS) algorithm for one-to-many multicast traffic with minimum spanning tree in WDM mesh networks. The propose algorithm can provie the local recovery for link failure or noe failure base on the information from core noes. The simulation results show that the propose algorithm outperforms the ual tree an MRLR algorithm in terms of the average hop count of recovery path an blocking probability, especially in the complicate network topology. The propose algorithm is scalable to large-size mesh networks an can achieve high network survivability an reliability. Furthermore, when multiple faults occur, the propose algorithm also can provie fast recovery ability an further research is the extension of more efficient core noes selection scheme to satisfy the many-to-many multicast services. We believe that the propose work will meet the requirements of future networks for high performance, scalability an reliability. References [1] B. Mukherjee, WDM optical communication networks: progress an challenges, IEEE Journal on Selecte Areas in Communications, Vol. 18, Issue, pp , Oct.. [2] A. Karaman an H. Hassanein, Core-selection algorithms in multicast routing - comparative an complexity analysis, Computer Communications, Vol. 29, Issue 8, pp , May 6. [3] D. Waitzman, C. Partrige, an S. Deering, Distance vector multicast routing protocol, IETF RFC 7, Nov [4] A. Aams, J. Nicholas, an W. Siaak, Protocol inepenent multicast - ense moe (PIM-DM): Protocol specification (Revise), IETF RFC 3973, Jan.. [] J. Moy, Multicast extensions to OSPF, IETF RFC 184, Mar [6] A.M. Al-Sharafi, M. Othman, M.N. Sulaiman, an S. Subramaniam, Moifying the multicast tree in AMTree protocol using ranom core selection, International Conference on Computer an Communication Engineering 8, Kuala Lumpur, pp , -1 May 8. [7] B. Fenner, M. Hanley, H. Holbrook, an I. Kouvelas, Protocol inepenent multicast - sparse moe (PIM-SM): Protocol specification (Revise), IETF RFC 41, Aug. 6. [8] A. Karaman an H. Hassanein, QoS-constraine core selection for group communication, Computer Communications, Vol., Issue 7, pp , May 7. [9] A. Chakrabarti an G. Manimaran, A case for tree migration an integrate tree maintenance in QoS multicasting, Computer Communications, Vol. 26, Issue 9, pp. 7-17, June 3. [] A. Fei, J. Cui, M. Gerla, an D. Cavenish, A ual-tree scheme for fault-tolerant multicast, IEEE International Conference on Communications, Helsinki, Finlan, Vol. 3, pp , June 1. [] I.S. Hwang, R.Y. Cheng, an W.D. Tseng, A novel ynamic multiple ring-base local restoration for point-to-multipoint multicast traffic in WDM mesh networks, Photonic Network Communications, Vol. 14, No. 1, pp , Aug. 7. [12] G. Maier, A. Pattavina, S.D. Patre, an M. Martinelli, Optical network survivability: protection techniques in the WDM layer, Photonic Network Communications, Vol. 4, No. 3, pp , 2. [] A.F. Elrefaie, Multiwavelength survivable ring network architectures, IEEE International Conference on Communications, Geneva, Vol. 3, pp , May 23-26, [14] J. Tapolcai, P.H. Ho; D. Verchere, T. Cinkler, an A. Haque, A new share segment protection metho for survivable networks with guarantee recovery time, IEEE Transactions on Reliability, Vol. 7, No. 2, pp , June 8. [1] M. Mear, S.G. Finn, R.A. Barry, an R.G. Gallager, Reunant trees for preplanne recovery in arbitrary vertex-reunant or ege-reunant graphs, IEEE/ACM Transactions on Networking, Vol. 7, Issue, pp , Oct [16] C. Boworntummarat, L. Wuttisittikulkij, an S. Segkhoontho, Light-tree base protection strategies for multicast traffic in transport WDM mesh networks with multi-fiber systems, IEEE International Conference on Communications, Paris, France, Vol. 3, pp , June 4. [17] L. Guo, H. Yu, an L. Li, A new share-path protection algorithm uner share-risk link group constraints for survivable WDM mesh networks, Optics Communications, Vol. 246, Issue 4-6, pp , Feb.. [18] D. Xu, Y. Xiong, an C. Qiao, Novel algorithms for share segment protection, IEEE Journal on Selecte Areas in Communications, Vol. 21, Issue 8, pp. -31, Aug. 3. [19] L. Luhua, L. Lemin, an W. Sheng, Multicast protection scheme in survivable WDM optical networks, Journal of Network an Computer Applications, Vol. 31, Issue 3, pp , Dec. 6. ISBN: IMECS 9
Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks
Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,
More informationA Novel High Performance Multicast Scheme on Virtual Ring-Based 2D Torus Topology in DWDM Networks
Tamkang Journal of Science and Engineering, Vol. 14, No. 1, pp. 81 89 (2011) 81 A Novel High Performance Multicast Scheme on Virtual Ring-Based 2D Torus Topology in DWDM Networks I-Shyan Hwang 1 *, San-Nan
More informationDisjoint Multipath Routing in Dual Homing Networks using Colored Trees
Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,
More informationStudy of Network Optimization Method Based on ACL
Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department
More informationMessage Transport With The User Datagram Protocol
Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer
More informationMulticast Routing : Computer Networking. Example Applications. Overview
Multicast outing 5-744: Computer Networking Unicast: one source to one estination Multicast: one source to many estinations Two main functions: Efficient ata istribution Logical naming of a group L-0 Multicast
More informationCandidate-Cycle-based Heuristic Algorithm for Node-and-Link Protection of Dynamic Multicast Traffic in Optical DWDM Networks
Candidate-Cycle-based Heuristic Algorithm for Node-and-Link Protection of Dynamic Multicast Traffic in Optical DWDM Networks Ahmed Frikha, Samer Lahoud, and Bernard Cousin University of Rennes 1, IRISA,
More informationNon-Uniform Sensor Deployment in Mobile Wireless Sensor Networks
01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University
More informationEnhancement of the CBT Multicast Routing Protocol
Enhancement of the CBT Multicast Routing Protocol Seok Joo Koh and Shin Gak Kang Protocol Engineering Center, ETRI, Korea E-mail: sjkoh@pec.etri.re.kr Abstract In this paper, we propose a simple practical
More informationAn Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique
International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech
More informationQuestions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!
EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an
More informationSURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH
SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html
More informationEDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks
sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun
More informationPerformance of Optical Burst Switching Techniques in Multi-Hop Networks
Performance of Optical Switching Techniques in Multi-Hop Networks Byung-Chul Kim *, You-Ze Cho *, Jong-Hyup Lee **, Young-Soo Choi **, and oug Montgomery * * National Institute of Standards and Technology,
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science
More informationDistributed Clustering Method for Large-Scaled Wavelength Routed Networks
Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Yukinobu Fukushima Graduate School of Information Science and Technology, Osaka University - Yamadaoka, Suita, Osaka 60-08, Japan
More informationAnyTraffic Labeled Routing
AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,
More informationMODULE VII. Emerging Technologies
MODULE VII Emerging Technologies Computer Networks an Internets -- Moule 7 1 Spring, 2014 Copyright 2014. All rights reserve. Topics Software Define Networking The Internet Of Things Other trens in networking
More informationNon-homogeneous Generalization in Privacy Preserving Data Publishing
Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h
More informationAdaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots
Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:
More informationBurst Routing Planning for Optical Networks using the Association Rule Approach
IJCSNS International Journal of Computer Science and Network Security, VOL.6 No., October 2006 173 Burst Routing Planning for Optical Networks using the Association Rule Approach I-Shyan Hwang, Chaochang
More informationEnhanced Cores Based Tree for Many-to-Many IP Multicasting
Enhanced Cores Based Tree for Many-to-Many IP Multicasting In this paper, we propose a simple and practical scheme for many-to-many IP multicasting. The proposed scheme is based on the core based tree
More informationOverview : Computer Networking. IEEE MAC Protocol: CSMA/CA Internet mobility TCP over noisy links
Overview 15-441 15-441: Computer Networking 15-641 Lecture 24: Wireless Eric Anerson Fall 2014 www.cs.cmu.eu/~prs/15-441-f14 Internet mobility TCP over noisy links Link layer challenges an WiFi Cellular
More informationVirtual Source-Based Minimum Interference Path Multicast Routing with Differentiated QoS Guarantees in the Next Generation Optical Internet
Virtual Source-Based Minimum Interference Path Multicast Routing with Differentiated QoS Guarantees in the Next Generation Optical Internet Suk-Jin Lee 1, Kyung-Dong Hong 1, Chun-Jai Lee 1, Moon-Kyun Oh
More informationWhat is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals
What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting
More informationDelayed reservation decision in optical burst switching networks with optical buffers
Delayed reservation decision in optical burst switching networks with optical buffers G.M. Li *, Victor O.K. Li + *School of Information Engineering SHANDONG University at WEIHAI, China + Department of
More informationSpare Capacity Planning Using Survivable Alternate Routing for Long-Haul WDM Networks
Spare Capacity Planning Using Survivable lternate Routing for Long-Haul WDM Networks in Zhou an Hussein T. Mouftah Department of lectrical an Computer ngineering Queen s University, Kingston, Ontario,
More informationQuestions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!
EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an
More informationImage Segmentation using K-means clustering and Thresholding
Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,
More informationOffloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization
1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24
More informationIntensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2
This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar
More informationA Modified Heuristic Approach of Logical Topology Design in WDM Optical Networks
Proceedings of the International Conference on Computer and Communication Engineering 008 May 3-5, 008 Kuala Lumpur, Malaysia A Modified Heuristic Approach of Logical Topology Design in WDM Optical Networks
More informationQueueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks
Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication
More informationWhy multicast? The concept of multicast Multicast groups Multicast addressing Multicast routing protocols MBONE Multicast applications Conclusions
Tuomo Karhapää tuomo.karhapaa@otaverkko.fi Otaverkko Oy Why multicast? The concept of multicast Multicast groups Multicast addressing Multicast routing protocols MBONE Multicast applications Conclusions
More informationComputer Organization
Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.
More informationTHE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM
International Journal of Physics an Mathematical Sciences ISSN: 2277-2111 (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao
More informationMultilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis
Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT
More informationEnhancement of the CBT Multicast Routing Protocol
Enhancement of the CBT Multicast Routing Protocol Seok Joo Koh and Shin Gak Kang Protocol Engineering Center, ETRI, Korea E- mail: sj ko h @ pcc.c t ri.rc.k Abstract In this paper, we propose a simple
More informationMulticast routing Draft
Multicast routing Draft Lucia Tudose Nokia Research Center E-mail: tudose@research.nokia.com Abstract Multicast routing is establishing a tree which is routed from the source node and contains all the
More informationNon-Uniform Sensor Deployment in Mobile Wireless Sensor Networks
0 0 0 0 0 0 0 0 on-uniform Sensor Deployment in Mobile Wireless Sensor etworks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University Boca Raton,
More informationMulticast Communications
Multicast Communications Multicast communications refers to one-to-many or many-tomany communications. Unicast Broadcast Multicast Dragkedja IP Multicasting refers to the implementation of multicast communication
More informationd 3 d 4 d d d d d d d d d d d 1 d d d d d d
Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching
More informationPerformance Assessment and Comparison between Star-ring based and Tree based EPONs
Performance Assessment and Comparison between Star-ring based and Tree based EPONs Zen-Der Shyu 1 Department of General Education, Army Academy, Taiwan I-Shyan Hwang 2,3, Chun-Wei Huang 3, and I-Cheng
More informationSpare Capacity Allocation Using Partially Disjoint Paths for Dual Link Failure Protection
Spare Capacity Allocation Using Partially Disjoint Paths for Dual Link Failure Protection Victor Yu Liu Network Advanced Research, Huawei Technologies Santa Clara, California, USA yuliu@ieee.org Abstract
More informationDynamic service Allocation with Protection Path
www.ijcsi.org 115 Dynamic service Allocation with Protection Path Loay Alzubaidi Department of Computer Engineering & Science, Prince Muhammad bin Fahd University AL-Khobar, Saudi Arabia Abstract Path
More informationAn Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks
An Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks Timothy Hahn, Shen Wan March 5, 2008 Montana State University Computer Science Department Bozeman,
More informationAutomatic Service and Protection Path Computation - A Multiplexing Approach
Automatic Service and Protection Path Computation - A Multiplexing Approach Loay Alzubaidi 1, Ammar El Hassan 2, Jaafar Al Ghazo 3 1 Department of Computer Engineering & Science, Prince Muhammad bin Fahd
More informationPAPER. 1. Introduction
IEICE TRANS. COMMUN., VOL. E9x-B, No.8 AUGUST 2010 PAPER Integrating Overlay Protocols for Proviing Autonomic Services in Mobile A-hoc Networks Panagiotis Gouvas, IEICE Stuent member, Anastasios Zafeiropoulos,,
More informationOptical Communications and Networking 朱祖勍. Nov. 27, 2017
Optical Communications and Networking Nov. 27, 2017 1 What is a Core Network? A core network is the central part of a telecommunication network that provides services to customers who are connected by
More informationThreshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides
Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita
More informationAvailable online at ScienceDirect
Available online at www.sciencedirect.com ScienceDirect Procedia Technology 0 ( 0 ) 900 909 International Conference on Computational Intelligence: Modeling, Techniques and Applications (CIMTA-0) Multicast
More informationResearch Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks
Hinawi Publishing Corporation International Journal of Distribute Sensor Networks Volume 2014, Article ID 936379, 17 pages http://x.oi.org/10.1155/2014/936379 Research Article REALFLOW: Reliable Real-Time
More informationProgress Report No. 15. Shared Segments Protection
NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 15 Shared Segments Protection The University of Canterbury Team 18 April 2006 Abstract As a complement to the Canterbury
More informationParticle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base
More informationLecture 1 September 4, 2013
CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the
More informationProvisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks
Provisioning Virtualize Clou Services in IP/MPLS-over-EON Networks Pan Yi an Byrav Ramamurthy Department of Computer Science an Engineering, University of Nebraska-Lincoln Lincoln, Nebraska 68588 USA Email:
More informationImpact of FTP Application file size and TCP Variants on MANET Protocols Performance
International Journal of Moern Communication Technologies & Research (IJMCTR) Impact of FTP Application file size an TCP Variants on MANET Protocols Performance Abelmuti Ahme Abbasher Ali, Dr.Amin Babkir
More informationDiversity Coded 5G Fronthaul Wireless Networks
IEEE Wireless Telecommunication Symposium (WTS) 2017 Diversity Coded 5G Fronthaul Wireless Networks Nabeel Sulieman, Kemal Davaslioglu, and Richard D. Gitlin Department of Electrical Engineering University
More informationMulti-layer Network Recovery: Avoiding Traffic Disruptions Against Fiber Failures
Multi-layer Network Recovery: Avoiding Traffic Disruptions Against Fiber Failures Anna Urra, Eusebi Calle, and Jose L. Marzo Institute of Informatics and Applications (IIiA), University of Girona, Girona
More informationAn Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach
An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach Nishi Sharma, Vanna Verma Abstract Wireless sensor networks (WSNs) is one of the emerging fiel of research in recent era
More informationOn the Placement of Internet Taps in Wireless Neighborhood Networks
1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that
More informationAn Algorithm for Traffic Grooming in WDM Mesh Networks with Dynamically Changing Light-Trees
An Algorithm for raffic rooming in WDM Mesh Networks with Dynamically Changing Light-rees Xiaodong Huang, Farid Farahmand, and Jason P. Jue Department of Computer Science Department of Electrical Engineering
More informationCategory: Informational Woven Systems May 2008
Network Working Group Request for Comments: 5186 Category: Informational B. Haberman Johns Hopkins University J. Martin Woven Systems May 2008 Internet Group Management Protocol Version 3 (IGMPv3) / Multicast
More informationApplication-Aware Protection in DWDM Optical Networks
Application-Aware Protection in DWDM Optical Networks Hamza Drid, Nasir Ghani, Bernard Cousin To cite this version: Hamza Drid, Nasir Ghani, Bernard Cousin. Application-Aware Protection in DWDM Optical
More informationDistributed Clustering Method for Large-Scaled Wavelength Routed Networks
Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Yukinobu Fukushima, Hiroaki Harai, Shin ichi Arakawa, and Masayuki Murata Graduate School of Information Science and Technology,
More informationAdaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks
Adaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks Tibor Fabry-Asztalos, Nilesh Bhide and Krishna M. Sivalingam School of Electrical Engineering &
More informationProbabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients
Probabilistic Meium Access Control for 1 Full-Duplex Networks with Half-Duplex Clients arxiv:1608.08729v1 [cs.ni] 31 Aug 2016 Shih-Ying Chen, Ting-Feng Huang, Kate Ching-Ju Lin, Member, IEEE, Y.-W. Peter
More informationMulticast OLSP Establishment Scheme in OVPN over IP/GMPLS over DWDM
Multicast OLSP Establishment Scheme in OVPN over IP/GMPLS over DWDM Jeong-Mi Kim 1, Oh-Han Kang 2, Jae-Il Jung 3, and Sung-Un Kim 1,4 1 Pukyong National University, 599-1 Daeyeon 3-Dong Nam-Gu, Busan,
More informationOn Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation
On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member
More informationAn Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources
An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract
More informationWavelength Assignment in a Ring Topology for Wavelength Routed WDM Optical Networks
Wavelength Assignment in a Ring Topology for Wavelength Routed WDM Optical Networks Amit Shukla, L. Premjit Singh and Raja Datta, Dept. of Computer Science and Engineering, North Eastern Regional Institute
More informationLab work #8. Congestion control
TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño
More informationEfficient path protection using Bi-directional WDM transmission technology. Title
Title Efficient path protection using Bi-directional WDM transmission technology Author(s) Li, J; Yeung, KL Citation Globecom - Ieee Global Telecommunications Conference, 2005, v. 4, p. 1910-1914 Issued
More informationA Novel Optimization Method of Optical Network Planning. Wu CHEN 1, a
A Novel Optimization Method of Optical Network Planning Wu CHEN 1, a 1 The engineering & technical college of chengdu university of technology, leshan, 614000,china; a wchen_leshan@126.com Keywords:wavelength
More informationDistributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs
IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,
More informationToward the joint design of electronic and optical layer protection
Toward the joint design of electronic and optical layer protection Massachusetts Institute of Technology Slide 1 Slide 2 CHALLENGES: - SEAMLESS CONNECTIVITY - MULTI-MEDIA (FIBER,SATCOM,WIRELESS) - HETEROGENEOUS
More informationImproving Spatial Reuse of IEEE Based Ad Hoc Networks
mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos
More informationSplitter Placement in All-Optical WDM Networks
plitter Placement in All-Optical WDM Networks Hwa-Chun Lin Department of Computer cience National Tsing Hua University Hsinchu 3003, TAIWAN heng-wei Wang Institute of Communications Engineering National
More information6.823 Computer System Architecture. Problem Set #3 Spring 2002
6.823 Computer System Architecture Problem Set #3 Spring 2002 Stuents are strongly encourage to collaborate in groups of up to three people. A group shoul han in only one copy of the solution to the problem
More informationSolution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation
Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University
More informationETSF10 Internet Protocols Routing on the Internet
ETSF10 Internet Protocols Routing on the Internet 2013, Part 2, Lecture 1.2 Jens Andersson (Kaan Bür) Routing on the Internet Unicast routing protocols (part 2) [ed.5 ch.20.3] Multicast routing, IGMP [ed.5
More informationPacket Rescheduling in Real-Time Using Token-passing Protocol in WDM Ring Access Networks
Tamkang Journal of Science and Engineering, Vol. 9, No 2, pp. 107 114 (2006) 107 Packet Rescheduling in Real-Time Using Token-passing Protocol in WDM Ring Access Networks I-Shyan Hwang*, San-Nan Lee and
More informationDynamic Wavelength Assignment for WDM All-Optical Tree Networks
Dynamic Wavelength Assignment for WDM All-Optical Tree Networks Poompat Saengudomlert, Eytan H. Modiano, and Robert G. Gallager Laboratory for Information and Decision Systems Massachusetts Institute of
More informationEstablishment of Survivable Connections in WDM Networks using Partial Path Protection
Establishment of Survivable Connections in WDM Networks using Partial Path Protection G. Xue 1, Senior Member, IEEE, W. Zhang 1,J.Tang 1, and K. Thulasiraman 2, Fellow, IEEE Abstract As a generalization
More informationA New Multicast Wavelength Assignment Algorithm in Wavelength-Converted Optical Networks
Int J Communications, Network and System Sciences, 2009, 2, 912-916 doi:104236/ijcns200929106 Published Online December 2009 (http://wwwscirporg/journal/ijcns/) A New Multicast Waelength Assignment Algorithm
More informationA Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks
A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks Wojciech Molisz and Jacek Rak Gdansk University of Technology, G. Narutowicza 11/12, Pl-8-952 Gdansk, Poland
More informationCoupling the User Interfaces of a Multiuser Program
Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces
More informationApplying p-cycle Protection Approach for a Reliable IPTV Service in IP-over-DWDM Networks
Frikha et al. RESEARCH Applying p-cycle Protection Approach for a Reliable IPTV Service in IP-over-DWDM Networks Ahmed Frikha *, Bernard Cousin and Samer Lahoud Abstract Today, IPTV service has become
More informationSupporting Fully Adaptive Routing in InfiniBand Networks
XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar
More informationComparison of Methods for Increasing the Performance of a DUA Computation
Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,
More informationIEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,
More informationLearning Subproblem Complexities in Distributed Branch and Bound
Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University
More informationPerformance analysis of realistic optical time division multiplexed wavelength routed networks. Creative Commons: Attribution 3.0 Hong Kong License
Title Performance analysis of realistic optical time division multiplexed wavelength routed networks Author(s) Li, CY; Li, G; Wai, PKA; Li, VOK Citation The 8th IEEE Annual Workshop on Computer Communications
More informationFault Tolerant System for Sparse Traffic Grooming in Optical WDM Mesh Networks Using Combiner Queue
Fault Tolerant System for Sparse Traffic Grooming in Optical WDM Mesh Networks Using Combiner Queue Sandip R. Shinde Research Scholar, Sathyabama University, Chennai & Assistant Professor, Vishwakarma
More informationA Stochastic Process on the Hypercube with Applications to Peer to Peer Networks
A Stochastic Process on the Hypercube with Applications to Peer to Peer Networs [Extene Abstract] Micah Aler Department of Computer Science, University of Massachusetts, Amherst, MA 0003 460, USA micah@cs.umass.eu
More informationRouting and quality of service support for mobile ad hoc networks
Computer Networks 51 (2007) 3142 3156 www.elsevier.com/locate/comnet Routing an quality of service support for mobile a hoc networks Anelise Munaretto a,c, *, Mauro Fonseca b,c a CPGEI/UTFPR, Programa
More informationPrinciples of B-trees
CSE465, Fall 2009 February 25 1 Principles of B-trees Noes an binary search Anoe u has size size(u), keys k 1,..., k size(u) 1 chilren c 1,...,c size(u). Binary search property: for i = 1,..., size(u)
More informationMORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks
: a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications
More informationADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS
ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS Ching-Lung Chang, Yan-Ying, Lee, and Steven S. W. Lee* Department of Electronic Engineering, National
More information