An Extended Fault-Tolerant Link-State Routing Protocol in the Internet
|
|
- Franklin Park
- 6 years ago
- Views:
Transcription
1 An Extended Falt-Tolerant Link-State Roting Protocol in the Internet Jie W, Xiaola Lin, Jiannong Cao z, and Weijia Jia x Department of Compter Science and Engineering Florida Atlantic Uniersit Boca Raton, FL 3343 jie@cse.fa.ed Abstract Link-state roting protocols, sch as OSPF and IS-IS, are idel sed in the Internet noadas. In link-state roting protocols, global netork topolog is first collected at each node. A shortest path tree (SPT) is then constrcted b appling the Dijkstra s shortest path algorithm at each node. Link-state protocols normall reqire the flooding of ne information to the entire (sb)netork after changes in an link state (inclding link falts). Naraez et al. recentl proposed a falt-tolerant link-state roting protocol ithot flooding. The idea is to constrct a shortest restoration path for each ni-directional link falt. Falt link information is distribted onl to the nodes in the restoration path and onl one restoration path is constrcted. It is shon that this approach is loop-free. Hoeer, Naraez approach is inefficient hen a link failre is bi-directional, becase a restoration path is ni-directional and roting tables of nodes in the path are partiall pdated. In addition, to restoration paths ma be generated for each bi-directional link falt. In this paper, e extend the Naraez protocol to efficientl handle a bi-directional link falt b making the restoration path bi-directional. Seeral desirable properties of the proposed extended roting protocol are also explored. Ke ords: Falt tolerance, Internet, link-state, loopfree, roting Introdction Link-staterotingprotocols,schasOSPF[4,5,6,9] and IS-IS [, 8], are the dominant roting protocols in the This ork as spported in part b NSF grant CCR and NSF grant ANI Department of Electrical and Electronics Engineering, The Uniersit of Hong Kong, xlin@hkeee2.hk.hk. z Department of Compting, The Hong Kong Poltechnic Uniersit, csjcao@comp.pol.ed.hk. x Department of Compter Science, The Cit Uniersit of Hong Kong, jia@cs.cit.ed.hk. Internet [2]. There are to major phases in sch protocols: () each IP roter first collects the complete topological information of the nderling (sb)netork; (2) each roter then comptes the rotes according to the collected topological information. The first phase is performed distribtiel b all the roters in the netork throgh exchanging link state information ith its neighboring roters. In the second phase, each roter can constrct a roting table based on the shortest path tree (SPT) bilt sing the topological information. An SPT algorithm sch as the Dijkstra s shortest path algorithm [3] can be sed in bilding the SPT. Compared to other roting protocols sch as distanceector protocols, one of the major adantages of link-state protocols is that each roter comptes the rotes independentl sing the same original stats data; it does not depend on the comptation done in other roters in the netork. When link-states are changed in the netork, ne information onl needs to be sent once to each roter for pdating the roting table. Hitema [4] listed for good reasons that most netork specialists faor link state protocols oer the distance ector ariet: () fast, loopless conergenc; (2) spport of precise metrics and, if needed, mltiple metrics; (3) spport of mltiple paths to a destination; and (4) separate representation of external rotes. Hoeer, link-state protocols sall reqire flooding the netork hen an change occrs in the link states in the netork. Flooding ma be prohibitiel expensie, especiall hen the link states change too qickl or hen the nmber of links in the netork is too large. Limiting the freqenc of sch pdates can partiall sole the problem hen the effect of the change of cost metric is minor in terms of transmission dela. Hoeer, this approach is inefficient in coering a link falt becase certain paths ma be disconnected as a reslt of the link falt, dela in information pdate ill lead to n-delierable packets. In [7], Naraez et al. presented a roting algorithm based on the link state method to limit roting information that needs to be deliered in a link-state protocol hen a single link fails. Instead of sing the flooding method, the pro-
2 netork 2 Preliminar 2. Link-state protocols A tpical link-state protocol ses the folloing steps: restoration path initiated from. Topological information of the netork (link state) is first collected at each node b exchanging and accmlating adjacent link information among neighbors. Figre. A restoration path initiated from. posed scheme restores all the paths traersing the failed link b performing onl local pdates on the affected roters. Specificall, a shortest restoration path is constrcted that connects to for a falt link (see Figre ). Their method can restore loop-free roting after a link falt hile propagating information abot that failre to as fe roters as possible and onl to the ones along the shortest restoration path. This approach is also sefl to diert traffic for a congested link. Hoeer, Naraez approach is inefficient hen a link falt is bi-directional, becase a restoration path is ni-directional and roting tables of nodes in the path are partiall pdated. In addition, to restoration paths ma be generated for each bi-directional link falt. In this paper, e modif the Naraez protocol to efficientl handle the link falt b making the shortest restoration path bi-directional so that nodes on the restoration path is completel pdated and the constrction of the restoration path is initiated at the both end nodes of the falt link. Onl one shortest restoration path is constrcted if the shortest restoration path is niqe. When the shortest restoration path is not niqe, still one path is constrcted b either restricting the initiation process to onl one end node or extending the Dijkstra s algorithm. Seeral desirable properties of the proposed extended roting protocol are also explored. In the sbseqent discssion, e se nodes and roters interchangeabl. The rest of the paper is organized as follos: Section 2 reies the basic ideas sed in link-state roting protocols and briefl describes Naraez falt-tolerant link-state roting protocol ithot flooding. Section 3 proposes an extension of Naraez protocol for handling a bi-directional link falt. Section 4 discsses properties of the proposed extended roting protocol. Section 5 concldes this paper and discsses possible ftre ork. 2. A shortest path tree (SPT) is constrcted at each node b appling a SPT algorithm, sch as the Dijkstra s shortest path algorithm, on the graph representing the netork topolog. 3. For an roting ith a gien destination, a shortest path is selected from the SPT at the sorce node if the sorce roting approach is sed; otherise, a roting table is constrcted from the SPT if the distribted roting approach is applied. The roting table incldes next hop information for each destination. Note that in sorce roting, the sorce node decides the complete path hile in distribted roting onl the next hop is decided at each node along the roting path. In this paper, e se the distribted roting approach here a roting table is constrcted directl at each node based on the associated SPT. A (sb)netork that ses link-state roting protocols can be ieed as an ndirected graph G = (V; E), here V is a ertex (node) set and E is an edge (link) set. (; ) 2 E is a bi-directional link here and are to ertices in V. represents a directed link from to. Each (; ) is associated ith a cost (a positie nmber) representing the cost of traeling from to (and from to ). Clearl, (; ) can be ieed as to directed links and, and nodes and keep the link state of and, respectiel. Note that the aboe model is commonl sed in most roting protocol inclding OSPF [4]. Let (= 0 ),, 2, :::, (= n ) denote a path hich is a seqence of directed links from to here ertices i are distinct. It is assmed that a link falt is bidirectional. The end nodes and of a falt link (; ) can detect a bi-directional falt. The tnneling scheme is a possible soltion to handle link falts. Basicall, a ne path from to is constrcted hen link is broken (link is also broken). An path containing ill be replaced b a ne path from to. Once a packet arries at, it ill be encapslated in another packet ith destination and forardedalong the ne path ntil reaching. Then the packet is decapslated. The remaining roting process follos a reglar link-state roting protocol. Hoeer, encapslation/decapslation limits the efficienc of high-speed roters, since eer single data
3 2 x z (a) 4 x z (b) 5 Branch Update Algorithm [7] At node = 0 pon detecting a falt link, or at node i (here i 6=06= n) pon receiing a special packet indicating the failre of.. The set D i is defined as all the nodes that are descendents of in the shortest path tree SPT rooted at i (see Figre 3). 2. The link-state database is modified to incorporate the change of state of link (the link is don). 3. The Dijkstra s shortest path algorithm is applied to recomptes the next hop for reaching node onl. The ne next hop for is no some other node i+. 4. The next hop for all the nodes in D i is set to i+. Figre 2. To sample examples. 5. If i+ is not eqal to, send a special packet to i+ indicating the failre of. packet that goes throgh the ne path has to be encapslated at node. This method is not sitable to be sed in high-speed netorks. Naraez et al. [7] proposed a falt-tolerant link-state roting in the Internet ithot flooding. This approach can handle one ni-directional link falt at a time. The basic idea is to restore all the paths traersing the falt link b performing pdates onl in the neighborhood. First a shortest restoration path (a path ith the minimm cost) is constrcted that connects to (assming fails as in Figre ). Then onl nodes along the shortest restoration path need to pdate their roting tables. Specificall, e onl need to pdate next-hop information for those destinations that are descendents of the falt link in the SPT. The a these roting tables shold be pdated remains a challenge. A simple pdate that recomptes roting tables of nodes along the restoration path does not ork, becase packets might leae the restoration path too soon. For the example illstrated in Figre 2 (a), sppose that onl the roting tables associated ith nodes and are pdated and,, forms a shortest restoration path for falt link. A packet from to ill exit at to z. Becase the roting table associated ith z is not pdated, path z,,,, is still considered the shortest. Therefore, is selected as the next hop, and conseqentl, a roting loop beteen and z is formed. Forcing all the packets that old hae had to traerse the falt link to trael throgh the entire restoration path old not ork either. For the example of Figre 2 (b), assming that a packet need to be forarded from to z, once the packet reaches at ia,,, the next hop ill be since,, z is the shortest path to z. Again a roting loop occrs beteen and. In this sitation, a packet exits the restoration path too late. 2.2 Branch pdate algorithm The branch pdate algorithm proposed b Naraez et al. as designed in sch a a that a packet exits a restoration path at a right time. This protocol constrcts a shortest restoration path (= 0 ),, 2,:::,(= n ) initiated from for falt link. Note that an path connecting to, not necessaril the shortest one, can be sed as a restoration path. Naraez protocol has to desirable properties: It garantees loop-free roting after the link falt. If a minimal restoration path (in terms of hop cont) is sed, it garantees the minimm nmber of nodes that need to be informed of the link falt. Hoeer, the branch pdate algorithm can onl handle a ni-directional link falt. Using the algorithm, to restoration paths are needed for each link falt that is bidirectional. For the example of Figre, an otdated SPT rooted at can reach a destination ia either,, or,, (other destinations hose shortest paths do not inclde or are of no interest here). In the branch pdate algorithm here is the initiator, it onl pdates the path of tpe,, to a destination and the sccessor of in the restoration path is selected as the next hop to reach the destination. When the path is of tpe,,, itis taken care of b another restoration path initiated from.
4 i other branches netork D i Figre 3. A SPT rooted at i : triangle D i contains descendents of hich belongs to a branch of i and triangle other branches" contains other branches of i. x When these to paths share the same node set, each node in the set is isited tice, one for each packet initiated from each end node of the falt link. When to restoration paths do not share the same node set, the sitation is more complex. Consider the example of Figre 4 here link (; ) fails, the restoration path initiated from is, x,, and the one initiated from is,,,. (The case for can be treated in a similar a.) Sppose x does not appear in,,,, then the roting table of x is partiall pdated, i.e., x knos the failre of bt not that of. In fact, an shortest path of tpe x,, to a destination is not pdated at x, ths roting proceeds based on the otdated roting table ithot ne information abot the falt link (; ) ntil the packet reaches a node on the restoration path,,, (initiated from ). Then node is reached b folloing the restoration path,,,. 3 Extended Branch Update Algorithm In the extended roting protocol proposed in this paper, onl one restoration path needs to be constrcted for a bidirectional link falt as long as the shortest path is niqe. This is done b making the path bi-directional. Initiall, still to restoration paths are initiated, one from each end node of a falt link. When to restoration paths for the same link falt meet at an intermediate node, both processes stop. In the examples of Figres and 4, hen to restoration paths meet at node, both processes stop. A bi-directional restoration path P(; ; ) is constrcted for Figre and P(; x; ; ; ) for Figre 4. To make the restoration path bi-directional, e distingish the orientation of the path to a destination that goes throgh the falt link (; ). Sppose is a node in the restoration path initiated from,ifapath deried from the SPT that is initiated from to a destination contains link (i.e., the path is of tpe,, ), the corresponding destination is kept in set D. If the path is of tpe,,, the corresponding destination is kept in D 0. Figre 4. To restoration paths for falt link (; ). The next hop of a destination in D (D 0 ) is the sccessor (predecessor) of in the restoration path. To relate to restoration paths that are intended for the same link falt, a special marker is sed for each falt link. A node in the restoration path is marked once isited. Note that the shortest path tree (SPT) propert implies that at least one of D and D 0 is empt. The extended branch pdate algorithm is also applied to the other end node of the falt link (; ) b exchanging theroleof and. The extended roting protocol garantees a shortest restoration path (see Theorem 3). In addition, it garantees that onl a minimal nmber of nodes needs to be informed hen the proposed roting protocol tries to search for a minimal restoration path (see Theorem 4). Note that the restoration path initiated from ma or ma not be the reerse of the one initiated from, becase seeral shortest paths ma exist in a gien netork. To bi-directional restoration paths ill be constrcted for a bidirectional link falt (; ). The sitation here a marked node is encontered deseres more discssion. Sppose i is a marked node ( i cold be ) of the restoration path initiated from enconters (see Figre 5). That means the restoration path initiated from has selected i in its restoration path; that is, the restoration path initiated from has passed throgh node i and a signal has been sent to either i, or a node other than i,, sa. In either case, the process initiated from simpl stops at i as shon in Figre 5. Eentall, the path initiated from ill reach a marked node j ( j cold be ). Again, the process simpl stops at j. The restoration paths constrcted in the aboe sitation are called oerlapping paths. In the special case here j = and i =, the resltant paths are called node-disjoint paths. To restoration paths exist for each direction, one
5 Extended Branch Update Algorithm At node = 0 pon detecting a falt link (; ), orat node i (here i 6=06= n) pon receiing a special packet indicating the failre of (; (= n )): j i i+. The set D i (and D 0 i ) is defined as all the nodes that are descendents of (and ) in the shortest path tree (SPT) rooted at i. 2. If i has been marked for (; ), exit; otherise, i is marked. 3. The link-state database is modified to incorporate the change of state of link (; ) (the link is don). 4. The next hop for all the nodes in D 0 i is set to i,. 5. If i is, exit; otherise, the Dijkstra s shortest path algorithm is applied to recomptes the next-hop for node onl. The ne next hop for is no some other node i+. 6. The next hop for all the nodes in D i is set to i+. 7. Send a special packet to i+ indicating the failre of (; ). complete (that connects and ) and one incomplete. In Figre 5,, j, j+, i, and 0,, i, are for D hile, i,, 0, j, and i,, j+, j, are for D 0. Althogh to restoration paths are constrcted for each bi-directional link falt, each node in a restoration path is completel pdated rather than partiall pdated as in the original branch pdate algorithm. That is, ith the same nmber of informed nodes, the extended roting protocol proides roting information more accratel than that of the branch pdate algorithm. The net effect is that the proposed roting protocol proides shorter rotes for some destinations. Consider again the example of Figre 2, sppose that node z intends to forard a packet to. The packet is forarded to, becase z does not hae ne information abot the link falt (; ) and z,,,, is still considered the shortest path from z to. If belongs to a restoration path,, initiated from, the packet is forarded to based on the extended roting protocol (the predecessorof in the restoration path). Hoeer, sing the original branch pdate algorithm here to separate restoration paths are constrcted:, x, (initiated from )and,, (initiated from ), since path,,, is not pdated at, the packet ill be sent to and then forarded to along the restoration path, x,. Finall, j+ i- Figre 5. Oerlapping restoration paths. the packet is sent to ia. The resltant roting path is z,,, x,,. Note that the path,, is jst the optimal replacement for falt link (; ), ths the resltant roting path z,,, generated from the extended roting protocol is not shortest. In fact, the shortest path from z to is path z, ith a cost of. Hoeer, if the shortest path does not contain the falt link, it ill remain the shortest. If the reqirement is to generate a single restoration path for each link falt, the extended roting protocol can be easil modified to ensre that one and onl one end node of each link falt initiates the constrction of a restoration path. This can be accomplished b comparing the IDs of to end nodes and letting the one ith the larger ID initiate the process. Still another approach exists hich initiates the constrction from both end nodes bt garantees single restoration path. It is based on a simple modification of the Dijkstra s algorithm hich allos s to detect all the eqal length paths [4]. Here e frther modif the extended Dijkstra s algorithm b keeping the ID of the last hop of each path dring the formation of SPT. Dring the formation of SPT, hen to eqal length paths are detected the one ith a larger ID of the last hop sries. In addition, both and tr to find a restoration path from and, and the restoration path from is jst the reerse of the one from. 4 Properties In this section, e std seeral desirable properties of the extended branch pdate algorithm. Let G and G 0 be graphs (representing netork topolog) before and after link falt (; ). d G (; ) and d G 0(; ) are distance beteen and in G and G 0, respectiel. Since and are directl connected in G, d G (; ) is the cost of link (; ) in G. Unless otherise specified, the restoration path here refers to either a single restoration path or oerlapping restoration paths (inclding node-disjoint restoration paths). The folloing reslt shos that shortest paths in G remains the shortest in G 0 if the are not affected b the falt link; otherise, the lengths of these paths increase b a predictable ale. Theorem : The extended branch pdate algorithm ensres
6 roting optimalit as long as the path constrcted before the link falt does not contain the falt link; otherise, the increase in the length of the path is pper bonded b d G 0(; ) - d G (; ). Proof: It is clear that a link falt (; ) ill not decrease the distance beteen to nodes. Therefore, a shortest path in G remains the shortest in G 0 if the path does not contain the falt link. On the other hand, if a shortest path in G contains (; ), the falt link ill be replaced b a shortest restoration path beteen and in G 0. Consider a destination hich is a descendant of in the SPT. Sppose the packet to be roted reaches node ithot reaching annodealongtherestorationpath, thenlink is replaced b the restoration path and the length of the path increases b d G 0(; ) - d G (; ). Note that the packet ma exit the restoration path becase a shorter path is fonded to the destination. In this case, the increase in the length of the path ill be less than d G 0(; ) - d G (; ). Sppose the packet reaches node hich is along the restoration path before it reaches node. In this case, the restoration path can be simpl expressed as,,. The packet directl follos the restoration path at node to reach node. Folloing the similar argment in the first case, the increase in the length of the path ill be pper bonded b d G 0(; ) - d G (; ) - d G 0(; ) <d G 0(; ) - d G (; ). Becase information abot the falt link is distribted to nodes along the restoration path, link state information associated ith different nodes are different, i.e., link state information is either pdated inclding the location of the falt link or otdated ithot inclding the location of the falt link. The folloing reslt shos that the roting process is still loop-free een ith inconsistent ies of link states among nodes in a netork. Theorem 2: The extended roting protocol ensres that loop-free roting ill contine after the link falt. Proof: We first reie a concept sed in [7]. A packet at node s is affected b a falt link if its intended destination d is a descendent of the falt link in the SPT rooted at s; otherise, it is n-affected. If there is onl one restoration path for falt link (; ), ithot loss of generalit, e assme that a packet is affected becase of (not ) as shon in Figre 3. The folloing three cases are considered (see Figre 6):. If a packet at node s is n-affected, it ill remain naffected and reach the destination d based on the otdated SPT that is loop-free. 2. If a packet at node s is affected and s is on the restoration path, then as long as the packet is affected, the packet ill sta on the restoration path ntil it becomes A similar reslt is gien in [7]; hoeer the proof in [7] is flaed. s i j d netork Figre 6. Loop-free roting. n-affected at j ( j cold be node ). Path s, j is loop-free. Since the packet is n-affected at j,it remains naffected and eentall reaches its intended destination d. Again, j, d is loop-free. In addition, paths s, j and j, d do not share an intermediate node. Therefore, path s, j, d is loop-free. 3. If a packet at node s is affected bt s is not on the restoration path, then the packet is roted based on the otdated SPT ntil reaching node i (inclding node ) hich is on the restoration path for (; ). Path s, i is clearl loop-free. As long as the packet is affected, the packet ill sta along the restoration path ntil it becomes n-affected at j (i<jand j cold be node ). Path i, j is loop-free. Since the packet is n-affected at j, it remains naffected and eentall reaches its intended destination d. Again, path j, d is loop-free. It is obios that i, j does not share an intermediate node ith either s, i or j, d, since intermediate nodes in i, j belong to the restoration path. We se proof b contradiction to sho that s, i and j, d do not share an intermediate node. Assme that these to paths share node hich has an otdated SPT (see Figre 6). Node in s, i is affected b the falt link hile node in j, d is n-affected. This is a contradiction. Therefore, s, i, j, d is loop-free. To oerlapping or node-disjoint restoration paths ma be constrctedfor a link falt (; ). This occrs in the extended branch pdate algorithm hen bi-directional restoration paths initiated from and do not select the same set of intermediate nodes. After oerlapping or node-disjoint restoration paths are constrcted, there are to restoration paths for each direction. Since each packet ill se at most one restoration path, the same argment sed for the single restoration path case still applies.
7 The next to theorems sho properties related to restoration path(s) constrcted from the extended roting protocol. Theorem 3: The extended roting protocol ensres shortest restoration path(s) from to (from to ). Proof: The reslt applies to complete restoration paths (hich connect and ). Based on the extended branch pdate algorithm, each node i has pdated link state information hen it selects node i+ on the restoration path. When to restoration paths are constrcted, the are done independentl from to end nodes of the falt link. Therefore, each path is a shortest one. If one restoration path from to is constrcted from combining to (sb)paths: one from each end node of the falt link (; ), ithot loss of generalit, e assme that these to paths are merged at node. Clearl, and, are the shortest paths beteen and and beteen and, respectiel.,, is the bi-directional path formed b combining, and, and it is a shortest restoration path beteen and ith being an intermediate node. In addition, there ill be no shorter restoration path beteen and ithot sing as an intermediate node; otherise ill not be selected dring the constrction of,. The case for the restoration path from to can be proed in a similar a. Theorem 4: If a minimal restoration path is sed and a single restoration path is constrcted, the extended roting protocol garantees sch a minimal path and the nmber of nodes along the path corresponds to the minimm nmber of nodes that need to be informed of the link falt. Proof: In [7], it has been proed that the nmber of nodes in a minimal restoration path corresponds to the minimm nmber of nodes that need to be informed of the link falt ithot casing loop-free, i.e., if the nmber of nodes to be informed is less than the minimm nmber, there is alas a set of metrics for the links of the netork that ill case an scheme to create roting loops after the link failre. Let P(; ) and P(; ) be the sections of bi-directional paths beteen and and beteen and, respectiel. We onl need to proe that hen the resltant restoration path is constrcted b combining P(; ) and P(; ) at node, path P(; ; ) has the minimm nmber of nodes. Clearl, both P(; ) and P(; ) contain minimm nmbers of nodes beteen and and beteen and, respectiel. P(; ; ) is the path formed b combining P(; ) and P(; ) and it is a minimm restoration path beteen and ith being an intermediate node. In addition, there ill be no restoration path beteen and ithot sing as an intermediate node that has a feer nmber of nodes; otherise ill not be selected dring the constrction of P(; ). 5 Conclsions In this paper, e hae extended a falt-tolerant link-state roting protocol in the Internet. This approach trades optimalit for lo oerhead. A shortest path is maintained as long as it does not contains a falt link; otherise, the falt link is replaced b a shortest restoration path and the cost increase of the resltant path is pper bonded b the cost difference beteen the shortest restoration path and the falt link. Or approach is based the premises that link falts are bi-directional. Therefore, instead of constrcting to ni-directional restoration paths (one from each end node of a falt link), one bi-directional restoration path is constrcted. Or ftre ork incldes inestigating other possible trade-offs beteen optimalit and lo oerhead. Different trade-offs ill be backed p throgh simlation std. Like Naraez approach the proposed approach can garantee loop-free roting onl hen one failre occrs at a time in the netork. The efficient a of handling mltiple falts still remains an open problem. References [] R. Callon. Use of OSI IS-IS for roting in TCP/IP and dal enironments. RFC-95, Dec. 9, 990. [2] D.E.Comer. Internetorking ith TCP/IP. Prentice Hall, Inc. ol., 2nd Edition, 99. [3] E. W. Dijkstra. A note on to problems in conexion ith graphs. Nmerische Mathematik. ol., 959, pp [4] C.Hitema. Roting in the Internet. Prentice Hall PTR. 2nd Edition, [5] J. McQillan, I. Richer, and E. Rosen. The ne roting algorithm for the ARPANET. IEEE Transactions on Commnications. ol. COM-28, no. 5, Ma 980, pp [6] J. Mo. OSPF ersion 2. Internet Draft, RFC-278, Jl 997. [7] P. Naraez, K.-Y. Si, and H.-Y. Tzeng. Falt-tolerant roting in the internet ithot flooding. in Dependable Netork Compting, Aersk (ed.), Kler Academic Pblishers, 2000, pp [8] R. Perlman. A comparison beteen to roting protocols: OSPF and IS-IS. IEEE Netorks. ol.5, Sept. 99, pp [9] M. Streenstrp. Roting in Commnications Netorks. Prentice Hall. 995.
Chapter 4: Network Layer
Chapter 4: Introdction (forarding and roting) Reie of qeeing theor Roting algorithms Link state, Distance Vector Roter design and operation IP: Internet Protocol IP4 (datagram format, addressing, ICMP,
More informationMobility Control and Its Applications in Mobile Ad Hoc Networks
Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai Department of Compter Science and Engineering Florida Atlantic Uniersity Boca Raton, FL 3331 Abstract Most existing localized
More informationNetwork layer. Two Key Network-Layer Functions. Datagram Forwarding table. IP datagram format. IP Addressing: introduction
Netork laer transport segment sending to receiing host on sending side encapslates segments into grams on rcing side, deliers segments to transport laer laer protocols in eer host, roter roter eamines
More informationAssignments. Computer Networks LECTURE 7 Network Layer: Routing and Addressing. Network Layer Function. Internet Architecture
ompter Netorks LETURE Netork Laer: Roting and ddressing ssignments Project : Web Pro Serer DUE OT Sandha Darkadas Department of ompter Science Uniersit of Rochester Internet rchitectre Bottom-p: phsical:
More informationChapter 4: Network Layer. TDTS06 Computer networks. Chapter 4: Network Layer. Network layer. Two Key Network-Layer Functions
Chapter : Netork Laer TDTS06 Compter s Lectre : Netork laer II Roting algorithms Jose M. Peña, jospe@ida.li.se ID/DIT, LiU 009-09- Chapter goals: nderstand principles behind laer serices: laer serice models
More informationMobility Control and Its Applications in Mobile Ad Hoc Networks
Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai, Florida Atlantic Uniersity Abstract Most eisting localized protocols in mobile ad hoc netorks, sch as data commnication
More informationChapter 5 Network Layer
Chapter Network Layer Network layer Physical layer: moe bit seqence between two adjacent nodes Data link: reliable transmission between two adjacent nodes Network: gides packets from the sorce to destination,
More informationOn Plane Constrained Bounded-Degree Spanners
Algorithmica manscript No. (ill be inserted by the editor) 1 On Plane Constrained Bonded-Degree Spanners 2 3 Prosenjit Bose Rolf Fagerberg André an Renssen Sander Verdonschot 4 5 Receied: date / Accepted:
More informationFlooding. Routing: Outlook. Flooding Algorithms. Spanning Tree. Flooding
Roting: Otlook Flooding Flooding Link-State: complete, global knoledge Distance-Vector: iteratie, distribted calclation Goal: To distribte a packet in the hole netork (i.e. to realie a netork-ide broadcast)
More informationOn Plane Constrained Bounded-Degree Spanners
On Plane Constrained Bonded-Degree Spanners Prosenjit Bose 1, Rolf Fagerberg 2, André an Renssen 1, Sander Verdonschot 1 1 School of Compter Science, Carleton Uniersity, Ottaa, Canada. Email: jit@scs.carleton.ca,
More informationThe Disciplined Flood Protocol in Sensor Networks
The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab
More information[1] Hopcroft, J., D. Joseph and S. Whitesides, Movement problems for twodimensional
Acknoledgement. The athors thank Bill Lenhart for interesting discssions on the recongration of rlers. References [1] Hopcroft, J., D. Joseph and S. Whitesides, Moement problems for todimensional linkages,
More informationRectangle-of-influence triangulations
CCCG 2016, Vancoer, British Colmbia, Ag 3 5, 2016 Rectangle-of-inflence trianglations Therese Biedl Anna Lbi Saeed Mehrabi Sander Verdonschot 1 Backgrond The concept of rectangle-of-inflence (RI) draings
More informationChapter 7 TOPOLOGY CONTROL
Chapter TOPOLOGY CONTROL Oeriew Topology Control Gabriel Graph et al. XTC Interference SINR & Schedling Complexity Distribted Compting Grop Mobile Compting Winter 00 / 00 Distribted Compting Grop MOBILE
More informationFixed-Parameter Algorithms for Cluster Vertex Deletion
Fixed-Parameter Algorithms for Clster Vertex Deletion Falk Hüffner Christian Komsieicz Hannes Moser Rolf Niedermeier Institt für Informatik, Friedrich-Schiller-Uniersität Jena, Ernst-Abbe-Platz 2, D-07743
More informationNon-convex Representations of Graphs
Non-conex Representations of Graphs Giseppe Di Battista, Fabrizio Frati, and Marizio Patrignani Dip. di Informatica e Atomazione Roma Tre Uniersity Abstract. We sho that eery plane graph admits a planar
More informationQueries. Inf 2B: Ranking Queries on the WWW. Suppose we have an Inverted Index for a set of webpages. Disclaimer. Kyriakos Kalorkoti
Qeries Inf B: Ranking Qeries on the WWW Kyriakos Kalorkoti School of Informatics Uniersity of Edinbrgh Sppose e hae an Inerted Index for a set of ebpages. Disclaimer I Not really the scenario of Lectre.
More informationStep N' D(v),p(v) D(w),p(w) D(x),p(x) D(y),p(y) D(z),p(z) 0 u 7,u 3,u 5,u. N (uw) update D(v), D(x), D(y), D(z)
Dijsktra s lgorithm Initialiation: N' = {s} for all nodes n If n adjacent to s then D(n) = c(s,n) 6 else D(n) = 8 Loop 9 Find m not in N' sch that D(m) is a minimm 0 dd m to N' pdate D(m) for all n adjacent
More informationOn the complexity of Submap Isomorphism
On the compleit of Sbmap Isomorphism Christine Solnon 1,2, Gillame Damiand 1,2, Colin de la Higera 3, and Jean-Christophe Janodet 4 1 INSA de Lon, LIRIS, UMR 5205 CNRS, 69621 Villerbanne, France 2 Université
More informationSelect-and-Protest-based Beaconless Georouting with Guaranteed Delivery in Wireless Sensor Networks
Select-and-Protest-based Beaconless Georoting ith Garanteed Deliery in Wireless Sensor Netorks Hanna Kalosha, Amiya Nayak, Stefan Rührp, Ian Stojmenoić School of Information Technology and Engineering
More informationMath 365 Wednesday 4/10/ & 10.2 Graphs
Math 365 Wednesda 4/10/19 10.1 & 10.2 Graphs Eercise 44. (Relations and digraphs) For each the relations in Eercise 43(a), dra the corresponding directed graph here V = {0, 1, 2, 3} and a! b if a b. What
More informationMaximal Cliques in Unit Disk Graphs: Polynomial Approximation
Maximal Cliqes in Unit Disk Graphs: Polynomial Approximation Rajarshi Gpta, Jean Walrand, Oliier Goldschmidt 2 Department of Electrical Engineering and Compter Science Uniersity of California, Berkeley,
More informationOn the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing
1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity
More informationLocalized Delaunay Triangulation with Application in Ad Hoc Wireless Networks
1 Localized Delanay Trianglation with Application in Ad Hoc Wireless Networks Xiang-Yang Li Gria Călinesc Peng-Jn Wan Y Wang Department of Compter Science, Illinois Institte of Technology, Chicago, IL
More informationCombinatorial and Geometric Properties of Planar Laman Graphs
Combinatorial and Geometric Properties of Planar Laman Graphs Stephen Koboro 1, Torsten Ueckerdt 2, and Kein Verbeek 3 1 Department of Compter Science, Uniersity of Arizona 2 Department of Applied Mathematics,
More informationFault Tolerance in Hypercubes
Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different
More informationCS 557 Lecture IX. Drexel University Dept. of Computer Science
CS 7 Lectre IX Dreel Uniersity Dept. of Compter Science Fall 00 Shortest Paths Finding the Shortest Paths in a graph arises in many different application: Transportation Problems: Finding the cheapest
More informationIsolates: Serializability Enforcement for Concurrent ML
Prde Uniersity Prde e-pbs Department of Compter Science Technical Reports Department of Compter Science 2010 Isolates: Serializability Enforcement for Concrrent ML Lkasz Ziarek Prde Uniersity, lziarek@cs.prde.ed
More informationMulti-Way Search Tree ( ) (2,4) Trees. Multi-Way Inorder Traversal. Multi-Way Search Tree ( ) Multi-Way Searching. Multi-Way Searching
Mlti-Way Search Tree ( 0..) (,) Trees 9 5 7 0 (,) Trees (,) Trees Mlti-Way Search Tree ( 0..) A mlti-ay search tree is an ordered tree sch that Each internal node has at least to children and stores d
More informationReal-Time Robot Path Planning via a Distance-Propagating Dynamic System with Obstacle Clearance
POSTPRINT OF: IEEE TRANS. SYST., MAN, CYBERN., B, 383), 28, 884 893. 1 Real-Time Robot Path Planning ia a Distance-Propagating Dynamic System with Obstacle Clearance Allan R. Willms, Simon X. Yang Member,
More informationv e v 1 C 2 b) Completely assigned T v a) Partially assigned Tv e T v 2 p k
Approximation Algorithms for a Capacitated Network Design Problem R. Hassin 1? and R. Rai 2?? and F. S. Salman 3??? 1 Department of Statistics and Operations Research, Tel-Ai Uniersity, Tel Ai 69978, Israel.
More informationCOMPOSITION OF STABLE SET POLYHEDRA
COMPOSITION OF STABLE SET POLYHEDRA Benjamin McClosky and Illya V. Hicks Department of Comptational and Applied Mathematics Rice University November 30, 2007 Abstract Barahona and Mahjob fond a defining
More informationarxiv: v2 [cs.cg] 5 Aug 2014
The θ 5 -graph is a spanner Prosenjit Bose Pat Morin André van Renssen Sander Verdonschot November 5, 2018 arxiv:12120570v2 [cscg] 5 Ag 2014 Abstract Given a set of points in the plane, e sho that the
More informationComplete Information Pursuit Evasion in Polygonal Environments
Complete Information Prsit Easion in Polygonal Enironments Kyle Klein and Sbhash Sri Department of Compter Science Uniersity of California Santa Barbara, CA 9306 Abstract Sppose an npredictable eader is
More informationCutting Cycles of Rods in Space: Hardness and Approximation
Ctting Cycles of Rods in Space: Hardness and pproximation oris rono ark de erg Chris Gray Elena mford bstract We stdy the problem of ctting a set of rods (line segments in R 3 ) into fragments, sing a
More informationReconstructing Generalized Staircase Polygons with Uniform Step Length
Jornal of Graph Algorithms and Applications http://jgaa.info/ ol. 22, no. 3, pp. 431 459 (2018) DOI: 10.7155/jgaa.00466 Reconstrcting Generalized Staircase Polygons with Uniform Step Length Nodari Sitchinaa
More informationPath Planning in Partially-Known Environments. Prof. Brian Williams (help from Ihsiang Shu) /6.834 Cognitive Robotics February 17 th, 2004
Path Planning in Partially-Known Enironments Prof. Brian Williams (help from Ihsiang Sh) 16.41/6.834 Cognitie Robotics Febrary 17 th, 004 Otline Path Planning in Partially Known Enironments. Finding the
More information(2, 4) Tree Example (2, 4) Tree: Insertion
Presentation for se with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 B-Trees and External Memory (2, 4) Trees Each internal node has 2 to 4 children:
More informationOn shortest-path all-optical networks without wavelength conversion requirements
Research Collection Working Paper On shortest-path all-optical networks withot waelength conersion reqirements Athor(s): Erlebach, Thomas; Stefanakos, Stamatis Pblication Date: 2002 Permanent Link: https://doi.org/10.3929/ethz-a-004446054
More informationA Unified Energy-Efficient Topology for Unicast and Broadcast
A Unified Energy-Efficient Topology for Unicast and Broadcast Xiang-Yang Li Dept. of Compter Science Illinois Institte of Technology, Chicago, IL, USA xli@cs.iit.ed Wen-Zhan Song School of Eng. & Comp.
More informationTowards Tight Bounds on Theta-Graphs
Toards Tight Bonds on Theta-Graphs arxiv:10.633v1 [cs.cg] Apr 01 Prosenjit Bose Jean-Lo De Carfel Pat Morin André van Renssen Sander Verdonschot Abstract We present improved pper and loer bonds on the
More informationChapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP
Chapter 4: outline 4. introduction 4. irtual circuit and datagram networks 4. what s inside a router 4.4 IP: Internet Protocol datagram format IP4 addressing ICMP IP6 4.5 routing algorithms link state
More informationDrawing Outer-Planar Graphs in O(n log n) Area
Draing Oter-Planar Graphs in O(n log n) Area Therese Biedl School of Compter Science, Uniersity of Waterloo, Waterloo, ON N2L 3G1, Canada, biedl@aterloo.ca Abstract. In this paper, e stdy draings of oter-planar
More informationConstructing and Comparing User Mobility Profiles for Location-based Services
Constrcting and Comparing User Mobility Profiles for Location-based Services Xihi Chen Interdisciplinary Centre for Secrity, Reliability and Trst, University of Lxemborg Jn Pang Compter Science and Commnications,
More informationTriangle Contact Representations
Triangle Contact Representations Stean Felsner elsner@math.t-berlin.de Technische Uniersität Berlin, Institt ür Mathematik Strasse des 7. Jni 36, 0623 Berlin, Germany Abstract. It is conjectred that eery
More informationProf. Kozyrakis. 1. (10 points) Consider the following fragment of Java code:
EE8 Winter 25 Homework #2 Soltions De Thrsday, Feb 2, 5 P. ( points) Consider the following fragment of Java code: for (i=; i
More informationPushing squares around
Pshing sqares arond Adrian Dmitresc János Pach Ý Abstract We stdy dynamic self-reconfigration of modlar metamorphic systems. We garantee the feasibility of motion planning in a rectanglar model consisting
More informationChapter 5. Plane Graphs and the DCEL
Chapter 5 Plane Graphs and the DCEL So far we hae been talking abot geometric strctres sch as trianglations of polygons and arrangements of line segments withot paying mch attention to how to represent
More informationNETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS
ETWORK PRESERVATIO THROUGH A TOPOLOGY COTROL ALGORITHM FOR WIRELESS MESH ETWORKS F. O. Aron, T. O. Olwal, A. Krien, Y. Hamam Tshwane University of Technology, Pretoria, Soth Africa. Dept of the French
More informationTdb: A Source-level Debugger for Dynamically Translated Programs
Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,
More informationh-vectors of PS ear-decomposable graphs
h-vectors of PS ear-decomposable graphs Nima Imani 2, Lee Johnson 1, Mckenzie Keeling-Garcia 1, Steven Klee 1 and Casey Pinckney 1 1 Seattle University Department of Mathematics, 901 12th Avene, Seattle,
More informationIP Multicast Fault Recovery in PIM over OSPF
1 IP Mlticast Falt Recovery in PIM over OSPF Abstract Relatively little attention has been given to nderstanding the falt recovery characteristics and performance tning of native IP mlticast networks.
More informationThe final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.
The final path PC 4 Add Reg Shift left 2 Add PCSrc Instrction [3-] Instrction I [25-2] I [2-6] I [5 - ] register register 2 register 2 Registers ALU Zero Reslt ALUOp em Data emtor RegDst ALUSrc em I [5
More informationDynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un
Dynamic Maintenance of Majority Information in Constant Time per Update? Gdmnd S. Frandsen and Sven Skym BRICS 1 Department of Compter Science, University of arhs, Ny Mnkegade, DK-8000 arhs C, Denmark
More informationVertex Guarding in Weak Visibility Polygons
Vertex Garding in Weak Visibility Polygons Pritam Bhattacharya, Sbir Kmar Ghosh*, Bodhayan Roy School of Technology and Compter Science Tata Institte of Fndamental Research Mmbai 400005, India arxi:1409.46212
More information5 Performance Evaluation
5 Performance Evalation his chapter evalates the performance of the compared to the MIP, and FMIP individal performances. We stdy the packet loss and the latency to restore the downstream and pstream of
More information3-DIMENSIONAL RESPONSE CHARACTERISTICS OF CONTINUOUS VIADUCT NEAR A FAULT
13 th World Conference on Earthqake Engineering Vancoer, B.C., Canada Agst 1-6, 24 Paper No. 367 3-DIMENSIONAL RESPONSE CHARACTERISTICS OF CONTINUOUS VIADUCT NEAR A FAULT Kotak OHO 1, Takanori HARADA 2
More informationarxiv: v1 [cs.cg] 27 Nov 2015
On Visibility Representations of Non-planar Graphs Therese Biedl 1, Giseppe Liotta 2, Fabrizio Montecchiani 2 David R. Cheriton School of Compter Science, University of Waterloo, Canada biedl@waterloo.ca
More informationFriend of My Friend: Network Formation with Two-Hop Benefit
Friend of My Friend: Network Formation with Two-Hop Benefit Elliot Ansheleich, Onkar Bhardwaj, and Michael Usher Rensselaer Polytechnic Institte, Troy NY, USA Abstract. How and why people form ties is
More informationEvaluating Influence Diagrams
Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will
More informationVisibility-Graph-based Shortest-Path Geographic Routing in Sensor Networks
Athor manscript, pblished in "INFOCOM 2009 (2009)" Visibility-Graph-based Shortest-Path Geographic Roting in Sensor Networks Gang Tan Marin Bertier Anne-Marie Kermarrec INRIA/IRISA, Rennes, France. Email:
More informationAssigning AS Relationships to Satisfy the Gao-Rexford Conditions
Assigning AS Relationships to Satisfy the Gao-Rexford Conditions Lca Cittadini, Giseppe Di Battista, Thomas Erlebach, Marizio Patrignani, and Massimo Rimondini Dept. of Compter Science and Atomation, Roma
More informationReal-Time Implementation of Adaptive Optimal Controller Based on a Pseudo-Space Model into PLC
Proceedings of the th WSEAS International Conference on SYSEMS, Agios Nikolaos, Crete Island, Greece, Jl 3-5, 7 3 Real-ime Implementation of Adaptive Optimal Controller Based on a Psedo-Space Model into
More informationcircuit simulation NP-complete? backward retiming forward retiming f(x)
Optimal FPGA Mapping and Retiming with Ecient Initial State Comptation Jason Cong and Chang W Department of Compter Science Uniersity of California, Los Angeles, CA 995 Abstract For seqential circits with
More informationEmbeddings of cubic Halin graphs: Genus distributions
Also aailable at http://amc.imfm.si ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 6 (2013) 37 56 Embeddings of cbic Halin graphs: Gens distribtions Jonathan
More informationMultiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET
Mltiple-Choice Test Chapter 09.0 Golden Section Search Method Optimization COMPLETE SOLUTION SET. Which o the ollowing statements is incorrect regarding the Eqal Interval Search and Golden Section Search
More informationConstructing Multiple Light Multicast Trees in WDM Optical Networks
Constrcting Mltiple Light Mlticast Trees in WDM Optical Networks Weifa Liang Department of Compter Science Astralian National University Canberra ACT 0200 Astralia wliang@csaneda Abstract Mlticast roting
More informationarxiv: v1 [cs.cg] 1 Feb 2016
The Price of Order Prosenjit Bose Pat Morin André van Renssen, arxiv:160.00399v1 [cs.cg] 1 Feb 016 Abstract We present tight bonds on the spanning ratio of a large family of ordered θ-graphs. A θ-graph
More informationPlanarity-Preserving Clustering and Embedding for Large Planar Graphs
Planarity-Presering Clstering and Embedding for Large Planar Graphs Christian A. Dncan, Michael T. Goodrich, and Stephen G. Koboro Center for Geometric Compting The Johns Hopkins Uniersity Baltimore, MD
More informationNonempty Intersection of Longest Paths in Series-Parallel Graphs
Nonempty Intersection of Longest aths in Series-arallel Graphs Jlia Ehrenmüller 1,, Cristina G. Fernandes 2,, and Carl Georg Heise 1,, 1 Institt für Mathematik, Technische Uniersität Hambrg-Harbrg, Germany,
More informationMultiple Source Shortest Paths in a Genus g Graph
Mltiple Sorce Shortest Paths in a Gens g Graph Sergio Cabello Erin W. Chambers Abstract We gie an O(g n log n) algorithm to represent the shortest path tree from all the ertices on a single specified face
More informationIOGP: An Incremental Online Graph Partitioning Algorithm for Distributed Graph Databases
: An Incremental Online Graph Partitioning Algorithm for Distribted Graph Databases Dong Dai Texas Tech University Lbbock, Texas dong.dai@tt.ed Wei Zhang Texas Tech University Lbbock, Texas X-Spirit.zhang@tt.ed
More informationAlliances and Bisection Width for Planar Graphs
Alliances and Bisection Width for Planar Graphs Martin Olsen 1 and Morten Revsbæk 1 AU Herning Aarhs University, Denmark. martino@hih.a.dk MADAGO, Department of Compter Science Aarhs University, Denmark.
More informationA Distributed Algorithm for Deadlock Detection and Resolution
A Distribted Algorithm for Deadlock Detection and Resoltion Don P. Mitchell Michael J. Merritt AT&T Bell Laboratories ABSTRACT This aer resents two distribted algorithms for detecting and resoling deadlocks.
More informationOptimization and Translation of Tableau-Proofs. Abstract: Dierent kinds of logical calculi have dierent advantages and disadvantages.
J. Inform. Process. Cybernet. EIK?? (199?), (formerly: Elektron. Inform.verarb. Kybernet.) Optimization and Translation of Tablea-Proofs into Resoltion By Andreas Wolf, Berlin Abstract: Dierent kinds of
More informationNetworks An introduction to microcomputer networking concepts
Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES
More informationThe single-cycle design from last time
lticycle path Last time we saw a single-cycle path and control nit for or simple IPS-based instrction set. A mlticycle processor fies some shortcomings in the single-cycle CPU. Faster instrctions are not
More informationObject Pose from a Single Image
Object Pose from a Single Image How Do We See Objects in Depth? Stereo Use differences between images in or left and right eye How mch is this difference for a car at 00 m? Moe or head sideways Or, the
More informationarxiv: v3 [math.co] 7 Sep 2018
Cts in matchings of 3-connected cbic graphs Kolja Knaer Petr Valicov arxiv:1712.06143v3 [math.co] 7 Sep 2018 September 10, 2018 Abstract We discss conjectres on Hamiltonicity in cbic graphs (Tait, Barnette,
More information4.13 Advanced Topic: An Introduction to Digital Design Using a Hardware Design Language 345.e1
.3 Advanced Topic: An Introdction to Digital Design Using a Hardware Design Langage 35.e.3 Advanced Topic: An Introdction to Digital Design Using a Hardware Design Langage to Describe and odel a Pipeline
More informationTowards applications based on measuring the orbital angular momentum of light
CHAPTER 8 Towards applications based on measring the orbital anglar momentm of light Efficient measrement of the orbital anglar momentm (OAM) of light has been a longstanding problem in both classical
More informationIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY 2007 1 On the Analysis of the Bletooth Time Division Dplex Mechanism Gil Zssman Member, IEEE, Adrian Segall Fellow, IEEE, and Uri Yechiali
More informationEfficient and Accurate Delaunay Triangulation Protocols under Churn
Efficient and Accrate Delanay Trianglation Protocols nder Chrn Dong-Yong Lee and Simon S. Lam Department of Compter Sciences The University of Texas at Astin {dylee, lam}@cs.texas.ed November 9, 2007 Technical
More informationImproving Network Connectivity Using Trusted Nodes and Edges
Improing Network Connectiity Using Trsted Nodes and Edges Waseem Abbas, Aron Laszka, Yegeniy Vorobeychik, and Xenofon Kotsokos Abstract Network connectiity is a primary attribte and a characteristic phenomenon
More informationAuthors. Tamilnadu, India 2.
International Jornal of Emerging Trends in Science and Technology Impact Factor: 2.838 DOI: http://dx.doi.org/10.18535/ijetst/3i03.04 Irredndant Complete Domination Nmber of Graphs Athors A.Nellai Mrgan
More informationABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS
Proceedings th FIG Symposim on Deformation Measrements Santorini Greece 00. ABSOUTE DEFORMATION PROFIE MEASUREMENT IN TUNNES USING REATIVE CONVERGENCE MEASUREMENTS Mahdi Moosai and Saeid Khazaei Mining
More informationEthernet Basics Learning Switches. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers
Ethernet Basics Learning Sitches based on Chapter 4 of CompTIA Netork+ Eam Guide, 4 th ed., Mike Meers Sitch Forarding A sitch forards frames based on destination MAC address Ho does the sitch kno hich
More informationtpa, bq a b is a multiple of 5 u tp0, 0q, p0, 5q, p0, 5q,...,
A binar relation on a set A is a sbset of A ˆ A, hereelements pa, bq are ritten as a b. For eample, let A Z, so A ˆ A tpn, mq n, m P Z. Let be the binar relation gien b a b if and onl if a and b hae the
More informationInternet Technology. 08. Routing. Paul Krzyzanowski. Rutgers University. Spring CS Paul Krzyzanowski
Internet Technolog 08. Routing Paul Kranoski Rutgers Universit Spring 06 March, 06 CS 0-06 Paul Kranoski Routing algorithm goal st hop router = source router last hop router = destination router router
More informationThe Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment
This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment
More informationMathematical model for storing and effective processing of directed graphs in semistructured data management systems
Mathematical model for storing and effectie processing of directed graphs in semistrctred data management MALIKOV A, GULEVSKIY Y, PARKHOMENKO D Information Systems and Technologies Department North Cacass
More informationThe extra single-cycle adders
lticycle Datapath As an added bons, we can eliminate some of the etra hardware from the single-cycle path. We will restrict orselves to sing each fnctional nit once per cycle, jst like before. Bt since
More informationCS 251, Winter 2019, Assignment % of course mark
CS 25, Winter 29, Assignment.. 3% of corse mark De Wednesday, arch 3th, 5:3P Lates accepted ntil Thrsday arch th, pm with a 5% penalty. (7 points) In the diagram below, the mlticycle compter from the corse
More informationTDT4255 Friday the 21st of October. Real world examples of pipelining? How does pipelining influence instruction
Review Friday the 2st of October Real world eamples of pipelining? How does pipelining pp inflence instrction latency? How does pipelining inflence instrction throghpt? What are the three types of hazard
More informationGETTING STARTED WITH PYGAME ON THE RASPBERRY PI
GETTING STARTED WITH PYGAME ON THE RASPBERRY PI Worksheet And Cheat Sheet.technoisaledcation.co.k This resorce is copyright TechnoVisal Limited 2017 bt permission is gien to freely copy for edcational
More informationConstrained Routing Between Non-Visible Vertices
Constrained Roting Between Non-Visible Vertices Prosenjit Bose 1, Matias Korman 2, André van Renssen 3,4, and Sander Verdonschot 1 1 School of Compter Science, Carleton University, Ottawa, Canada. jit@scs.carleton.ca,
More information5.0 Curve and Surface Theory
5. Cre and Srface Theor 5.1 arametric Representation of Cres Consider the parametric representation of a cre as a ector t: t [t t t] 5.1 The deriatie of sch a ector ealated at t t is gien b t [ t t t ]
More informationThis chapter is based on the following sources, which are all recommended reading:
Bioinformatics I, WS 09-10, D. Hson, December 7, 2009 105 6 Fast String Matching This chapter is based on the following sorces, which are all recommended reading: 1. An earlier version of this chapter
More informationFaster Random Walks By Rewiring Online Social Networks On-The-Fly
1 Faster Random Walks By Rewiring Online ocial Networks On-The-Fly Zhojie Zho 1, Nan Zhang 2, Zhigo Gong 3, Gatam Das 4 1,2 Compter cience Department, George Washington Uniersity 1 rexzho@gw.ed 2 nzhang10@gw.ed
More informationMinimum Spanning Trees Outline: MST
Minimm Spanning Trees Otline: MST Minimm Spanning Tree Generic MST Algorithm Krskal s Algorithm (Edge Based) Prim s Algorithm (Vertex Based) Spanning Tree A spanning tree of G is a sbgraph which is tree
More information