An Extended Fault-Tolerant Link-State Routing Protocol in the Internet

Size: px
Start display at page:

Download "An Extended Fault-Tolerant Link-State Routing Protocol in the Internet"

Transcription

1 An Extended Falt-Tolerant Link-State Roting Protocol in the Internet Jie W, Xiaola Lin, Jiannong Cao z, and Weijia Jia x Department of Compter Science and Engineering Florida Atlantic Uniersit Boca Raton, FL 3343 jie@cse.fa.ed Abstract Link-state roting protocols, sch as OSPF and IS-IS, are idel sed in the Internet noadas. In link-state roting protocols, global netork topolog is first collected at each node. A shortest path tree (SPT) is then constrcted b appling the Dijkstra s shortest path algorithm at each node. Link-state protocols normall reqire the flooding of ne information to the entire (sb)netork after changes in an link state (inclding link falts). Naraez et al. recentl proposed a falt-tolerant link-state roting protocol ithot flooding. The idea is to constrct a shortest restoration path for each ni-directional link falt. Falt link information is distribted onl to the nodes in the restoration path and onl one restoration path is constrcted. It is shon that this approach is loop-free. Hoeer, Naraez approach is inefficient hen a link failre is bi-directional, becase a restoration path is ni-directional and roting tables of nodes in the path are partiall pdated. In addition, to restoration paths ma be generated for each bi-directional link falt. In this paper, e extend the Naraez protocol to efficientl handle a bi-directional link falt b making the restoration path bi-directional. Seeral desirable properties of the proposed extended roting protocol are also explored. Ke ords: Falt tolerance, Internet, link-state, loopfree, roting Introdction Link-staterotingprotocols,schasOSPF[4,5,6,9] and IS-IS [, 8], are the dominant roting protocols in the This ork as spported in part b NSF grant CCR and NSF grant ANI Department of Electrical and Electronics Engineering, The Uniersit of Hong Kong, xlin@hkeee2.hk.hk. z Department of Compting, The Hong Kong Poltechnic Uniersit, csjcao@comp.pol.ed.hk. x Department of Compter Science, The Cit Uniersit of Hong Kong, jia@cs.cit.ed.hk. Internet [2]. There are to major phases in sch protocols: () each IP roter first collects the complete topological information of the nderling (sb)netork; (2) each roter then comptes the rotes according to the collected topological information. The first phase is performed distribtiel b all the roters in the netork throgh exchanging link state information ith its neighboring roters. In the second phase, each roter can constrct a roting table based on the shortest path tree (SPT) bilt sing the topological information. An SPT algorithm sch as the Dijkstra s shortest path algorithm [3] can be sed in bilding the SPT. Compared to other roting protocols sch as distanceector protocols, one of the major adantages of link-state protocols is that each roter comptes the rotes independentl sing the same original stats data; it does not depend on the comptation done in other roters in the netork. When link-states are changed in the netork, ne information onl needs to be sent once to each roter for pdating the roting table. Hitema [4] listed for good reasons that most netork specialists faor link state protocols oer the distance ector ariet: () fast, loopless conergenc; (2) spport of precise metrics and, if needed, mltiple metrics; (3) spport of mltiple paths to a destination; and (4) separate representation of external rotes. Hoeer, link-state protocols sall reqire flooding the netork hen an change occrs in the link states in the netork. Flooding ma be prohibitiel expensie, especiall hen the link states change too qickl or hen the nmber of links in the netork is too large. Limiting the freqenc of sch pdates can partiall sole the problem hen the effect of the change of cost metric is minor in terms of transmission dela. Hoeer, this approach is inefficient in coering a link falt becase certain paths ma be disconnected as a reslt of the link falt, dela in information pdate ill lead to n-delierable packets. In [7], Naraez et al. presented a roting algorithm based on the link state method to limit roting information that needs to be deliered in a link-state protocol hen a single link fails. Instead of sing the flooding method, the pro-

2 netork 2 Preliminar 2. Link-state protocols A tpical link-state protocol ses the folloing steps: restoration path initiated from. Topological information of the netork (link state) is first collected at each node b exchanging and accmlating adjacent link information among neighbors. Figre. A restoration path initiated from. posed scheme restores all the paths traersing the failed link b performing onl local pdates on the affected roters. Specificall, a shortest restoration path is constrcted that connects to for a falt link (see Figre ). Their method can restore loop-free roting after a link falt hile propagating information abot that failre to as fe roters as possible and onl to the ones along the shortest restoration path. This approach is also sefl to diert traffic for a congested link. Hoeer, Naraez approach is inefficient hen a link falt is bi-directional, becase a restoration path is ni-directional and roting tables of nodes in the path are partiall pdated. In addition, to restoration paths ma be generated for each bi-directional link falt. In this paper, e modif the Naraez protocol to efficientl handle the link falt b making the shortest restoration path bi-directional so that nodes on the restoration path is completel pdated and the constrction of the restoration path is initiated at the both end nodes of the falt link. Onl one shortest restoration path is constrcted if the shortest restoration path is niqe. When the shortest restoration path is not niqe, still one path is constrcted b either restricting the initiation process to onl one end node or extending the Dijkstra s algorithm. Seeral desirable properties of the proposed extended roting protocol are also explored. In the sbseqent discssion, e se nodes and roters interchangeabl. The rest of the paper is organized as follos: Section 2 reies the basic ideas sed in link-state roting protocols and briefl describes Naraez falt-tolerant link-state roting protocol ithot flooding. Section 3 proposes an extension of Naraez protocol for handling a bi-directional link falt. Section 4 discsses properties of the proposed extended roting protocol. Section 5 concldes this paper and discsses possible ftre ork. 2. A shortest path tree (SPT) is constrcted at each node b appling a SPT algorithm, sch as the Dijkstra s shortest path algorithm, on the graph representing the netork topolog. 3. For an roting ith a gien destination, a shortest path is selected from the SPT at the sorce node if the sorce roting approach is sed; otherise, a roting table is constrcted from the SPT if the distribted roting approach is applied. The roting table incldes next hop information for each destination. Note that in sorce roting, the sorce node decides the complete path hile in distribted roting onl the next hop is decided at each node along the roting path. In this paper, e se the distribted roting approach here a roting table is constrcted directl at each node based on the associated SPT. A (sb)netork that ses link-state roting protocols can be ieed as an ndirected graph G = (V; E), here V is a ertex (node) set and E is an edge (link) set. (; ) 2 E is a bi-directional link here and are to ertices in V. represents a directed link from to. Each (; ) is associated ith a cost (a positie nmber) representing the cost of traeling from to (and from to ). Clearl, (; ) can be ieed as to directed links and, and nodes and keep the link state of and, respectiel. Note that the aboe model is commonl sed in most roting protocol inclding OSPF [4]. Let (= 0 ),, 2, :::, (= n ) denote a path hich is a seqence of directed links from to here ertices i are distinct. It is assmed that a link falt is bidirectional. The end nodes and of a falt link (; ) can detect a bi-directional falt. The tnneling scheme is a possible soltion to handle link falts. Basicall, a ne path from to is constrcted hen link is broken (link is also broken). An path containing ill be replaced b a ne path from to. Once a packet arries at, it ill be encapslated in another packet ith destination and forardedalong the ne path ntil reaching. Then the packet is decapslated. The remaining roting process follos a reglar link-state roting protocol. Hoeer, encapslation/decapslation limits the efficienc of high-speed roters, since eer single data

3 2 x z (a) 4 x z (b) 5 Branch Update Algorithm [7] At node = 0 pon detecting a falt link, or at node i (here i 6=06= n) pon receiing a special packet indicating the failre of.. The set D i is defined as all the nodes that are descendents of in the shortest path tree SPT rooted at i (see Figre 3). 2. The link-state database is modified to incorporate the change of state of link (the link is don). 3. The Dijkstra s shortest path algorithm is applied to recomptes the next hop for reaching node onl. The ne next hop for is no some other node i+. 4. The next hop for all the nodes in D i is set to i+. Figre 2. To sample examples. 5. If i+ is not eqal to, send a special packet to i+ indicating the failre of. packet that goes throgh the ne path has to be encapslated at node. This method is not sitable to be sed in high-speed netorks. Naraez et al. [7] proposed a falt-tolerant link-state roting in the Internet ithot flooding. This approach can handle one ni-directional link falt at a time. The basic idea is to restore all the paths traersing the falt link b performing pdates onl in the neighborhood. First a shortest restoration path (a path ith the minimm cost) is constrcted that connects to (assming fails as in Figre ). Then onl nodes along the shortest restoration path need to pdate their roting tables. Specificall, e onl need to pdate next-hop information for those destinations that are descendents of the falt link in the SPT. The a these roting tables shold be pdated remains a challenge. A simple pdate that recomptes roting tables of nodes along the restoration path does not ork, becase packets might leae the restoration path too soon. For the example illstrated in Figre 2 (a), sppose that onl the roting tables associated ith nodes and are pdated and,, forms a shortest restoration path for falt link. A packet from to ill exit at to z. Becase the roting table associated ith z is not pdated, path z,,,, is still considered the shortest. Therefore, is selected as the next hop, and conseqentl, a roting loop beteen and z is formed. Forcing all the packets that old hae had to traerse the falt link to trael throgh the entire restoration path old not ork either. For the example of Figre 2 (b), assming that a packet need to be forarded from to z, once the packet reaches at ia,,, the next hop ill be since,, z is the shortest path to z. Again a roting loop occrs beteen and. In this sitation, a packet exits the restoration path too late. 2.2 Branch pdate algorithm The branch pdate algorithm proposed b Naraez et al. as designed in sch a a that a packet exits a restoration path at a right time. This protocol constrcts a shortest restoration path (= 0 ),, 2,:::,(= n ) initiated from for falt link. Note that an path connecting to, not necessaril the shortest one, can be sed as a restoration path. Naraez protocol has to desirable properties: It garantees loop-free roting after the link falt. If a minimal restoration path (in terms of hop cont) is sed, it garantees the minimm nmber of nodes that need to be informed of the link falt. Hoeer, the branch pdate algorithm can onl handle a ni-directional link falt. Using the algorithm, to restoration paths are needed for each link falt that is bidirectional. For the example of Figre, an otdated SPT rooted at can reach a destination ia either,, or,, (other destinations hose shortest paths do not inclde or are of no interest here). In the branch pdate algorithm here is the initiator, it onl pdates the path of tpe,, to a destination and the sccessor of in the restoration path is selected as the next hop to reach the destination. When the path is of tpe,,, itis taken care of b another restoration path initiated from.

4 i other branches netork D i Figre 3. A SPT rooted at i : triangle D i contains descendents of hich belongs to a branch of i and triangle other branches" contains other branches of i. x When these to paths share the same node set, each node in the set is isited tice, one for each packet initiated from each end node of the falt link. When to restoration paths do not share the same node set, the sitation is more complex. Consider the example of Figre 4 here link (; ) fails, the restoration path initiated from is, x,, and the one initiated from is,,,. (The case for can be treated in a similar a.) Sppose x does not appear in,,,, then the roting table of x is partiall pdated, i.e., x knos the failre of bt not that of. In fact, an shortest path of tpe x,, to a destination is not pdated at x, ths roting proceeds based on the otdated roting table ithot ne information abot the falt link (; ) ntil the packet reaches a node on the restoration path,,, (initiated from ). Then node is reached b folloing the restoration path,,,. 3 Extended Branch Update Algorithm In the extended roting protocol proposed in this paper, onl one restoration path needs to be constrcted for a bidirectional link falt as long as the shortest path is niqe. This is done b making the path bi-directional. Initiall, still to restoration paths are initiated, one from each end node of a falt link. When to restoration paths for the same link falt meet at an intermediate node, both processes stop. In the examples of Figres and 4, hen to restoration paths meet at node, both processes stop. A bi-directional restoration path P(; ; ) is constrcted for Figre and P(; x; ; ; ) for Figre 4. To make the restoration path bi-directional, e distingish the orientation of the path to a destination that goes throgh the falt link (; ). Sppose is a node in the restoration path initiated from,ifapath deried from the SPT that is initiated from to a destination contains link (i.e., the path is of tpe,, ), the corresponding destination is kept in set D. If the path is of tpe,,, the corresponding destination is kept in D 0. Figre 4. To restoration paths for falt link (; ). The next hop of a destination in D (D 0 ) is the sccessor (predecessor) of in the restoration path. To relate to restoration paths that are intended for the same link falt, a special marker is sed for each falt link. A node in the restoration path is marked once isited. Note that the shortest path tree (SPT) propert implies that at least one of D and D 0 is empt. The extended branch pdate algorithm is also applied to the other end node of the falt link (; ) b exchanging theroleof and. The extended roting protocol garantees a shortest restoration path (see Theorem 3). In addition, it garantees that onl a minimal nmber of nodes needs to be informed hen the proposed roting protocol tries to search for a minimal restoration path (see Theorem 4). Note that the restoration path initiated from ma or ma not be the reerse of the one initiated from, becase seeral shortest paths ma exist in a gien netork. To bi-directional restoration paths ill be constrcted for a bidirectional link falt (; ). The sitation here a marked node is encontered deseres more discssion. Sppose i is a marked node ( i cold be ) of the restoration path initiated from enconters (see Figre 5). That means the restoration path initiated from has selected i in its restoration path; that is, the restoration path initiated from has passed throgh node i and a signal has been sent to either i, or a node other than i,, sa. In either case, the process initiated from simpl stops at i as shon in Figre 5. Eentall, the path initiated from ill reach a marked node j ( j cold be ). Again, the process simpl stops at j. The restoration paths constrcted in the aboe sitation are called oerlapping paths. In the special case here j = and i =, the resltant paths are called node-disjoint paths. To restoration paths exist for each direction, one

5 Extended Branch Update Algorithm At node = 0 pon detecting a falt link (; ), orat node i (here i 6=06= n) pon receiing a special packet indicating the failre of (; (= n )): j i i+. The set D i (and D 0 i ) is defined as all the nodes that are descendents of (and ) in the shortest path tree (SPT) rooted at i. 2. If i has been marked for (; ), exit; otherise, i is marked. 3. The link-state database is modified to incorporate the change of state of link (; ) (the link is don). 4. The next hop for all the nodes in D 0 i is set to i,. 5. If i is, exit; otherise, the Dijkstra s shortest path algorithm is applied to recomptes the next-hop for node onl. The ne next hop for is no some other node i+. 6. The next hop for all the nodes in D i is set to i+. 7. Send a special packet to i+ indicating the failre of (; ). complete (that connects and ) and one incomplete. In Figre 5,, j, j+, i, and 0,, i, are for D hile, i,, 0, j, and i,, j+, j, are for D 0. Althogh to restoration paths are constrcted for each bi-directional link falt, each node in a restoration path is completel pdated rather than partiall pdated as in the original branch pdate algorithm. That is, ith the same nmber of informed nodes, the extended roting protocol proides roting information more accratel than that of the branch pdate algorithm. The net effect is that the proposed roting protocol proides shorter rotes for some destinations. Consider again the example of Figre 2, sppose that node z intends to forard a packet to. The packet is forarded to, becase z does not hae ne information abot the link falt (; ) and z,,,, is still considered the shortest path from z to. If belongs to a restoration path,, initiated from, the packet is forarded to based on the extended roting protocol (the predecessorof in the restoration path). Hoeer, sing the original branch pdate algorithm here to separate restoration paths are constrcted:, x, (initiated from )and,, (initiated from ), since path,,, is not pdated at, the packet ill be sent to and then forarded to along the restoration path, x,. Finall, j+ i- Figre 5. Oerlapping restoration paths. the packet is sent to ia. The resltant roting path is z,,, x,,. Note that the path,, is jst the optimal replacement for falt link (; ), ths the resltant roting path z,,, generated from the extended roting protocol is not shortest. In fact, the shortest path from z to is path z, ith a cost of. Hoeer, if the shortest path does not contain the falt link, it ill remain the shortest. If the reqirement is to generate a single restoration path for each link falt, the extended roting protocol can be easil modified to ensre that one and onl one end node of each link falt initiates the constrction of a restoration path. This can be accomplished b comparing the IDs of to end nodes and letting the one ith the larger ID initiate the process. Still another approach exists hich initiates the constrction from both end nodes bt garantees single restoration path. It is based on a simple modification of the Dijkstra s algorithm hich allos s to detect all the eqal length paths [4]. Here e frther modif the extended Dijkstra s algorithm b keeping the ID of the last hop of each path dring the formation of SPT. Dring the formation of SPT, hen to eqal length paths are detected the one ith a larger ID of the last hop sries. In addition, both and tr to find a restoration path from and, and the restoration path from is jst the reerse of the one from. 4 Properties In this section, e std seeral desirable properties of the extended branch pdate algorithm. Let G and G 0 be graphs (representing netork topolog) before and after link falt (; ). d G (; ) and d G 0(; ) are distance beteen and in G and G 0, respectiel. Since and are directl connected in G, d G (; ) is the cost of link (; ) in G. Unless otherise specified, the restoration path here refers to either a single restoration path or oerlapping restoration paths (inclding node-disjoint restoration paths). The folloing reslt shos that shortest paths in G remains the shortest in G 0 if the are not affected b the falt link; otherise, the lengths of these paths increase b a predictable ale. Theorem : The extended branch pdate algorithm ensres

6 roting optimalit as long as the path constrcted before the link falt does not contain the falt link; otherise, the increase in the length of the path is pper bonded b d G 0(; ) - d G (; ). Proof: It is clear that a link falt (; ) ill not decrease the distance beteen to nodes. Therefore, a shortest path in G remains the shortest in G 0 if the path does not contain the falt link. On the other hand, if a shortest path in G contains (; ), the falt link ill be replaced b a shortest restoration path beteen and in G 0. Consider a destination hich is a descendant of in the SPT. Sppose the packet to be roted reaches node ithot reaching annodealongtherestorationpath, thenlink is replaced b the restoration path and the length of the path increases b d G 0(; ) - d G (; ). Note that the packet ma exit the restoration path becase a shorter path is fonded to the destination. In this case, the increase in the length of the path ill be less than d G 0(; ) - d G (; ). Sppose the packet reaches node hich is along the restoration path before it reaches node. In this case, the restoration path can be simpl expressed as,,. The packet directl follos the restoration path at node to reach node. Folloing the similar argment in the first case, the increase in the length of the path ill be pper bonded b d G 0(; ) - d G (; ) - d G 0(; ) <d G 0(; ) - d G (; ). Becase information abot the falt link is distribted to nodes along the restoration path, link state information associated ith different nodes are different, i.e., link state information is either pdated inclding the location of the falt link or otdated ithot inclding the location of the falt link. The folloing reslt shos that the roting process is still loop-free een ith inconsistent ies of link states among nodes in a netork. Theorem 2: The extended roting protocol ensres that loop-free roting ill contine after the link falt. Proof: We first reie a concept sed in [7]. A packet at node s is affected b a falt link if its intended destination d is a descendent of the falt link in the SPT rooted at s; otherise, it is n-affected. If there is onl one restoration path for falt link (; ), ithot loss of generalit, e assme that a packet is affected becase of (not ) as shon in Figre 3. The folloing three cases are considered (see Figre 6):. If a packet at node s is n-affected, it ill remain naffected and reach the destination d based on the otdated SPT that is loop-free. 2. If a packet at node s is affected and s is on the restoration path, then as long as the packet is affected, the packet ill sta on the restoration path ntil it becomes A similar reslt is gien in [7]; hoeer the proof in [7] is flaed. s i j d netork Figre 6. Loop-free roting. n-affected at j ( j cold be node ). Path s, j is loop-free. Since the packet is n-affected at j,it remains naffected and eentall reaches its intended destination d. Again, j, d is loop-free. In addition, paths s, j and j, d do not share an intermediate node. Therefore, path s, j, d is loop-free. 3. If a packet at node s is affected bt s is not on the restoration path, then the packet is roted based on the otdated SPT ntil reaching node i (inclding node ) hich is on the restoration path for (; ). Path s, i is clearl loop-free. As long as the packet is affected, the packet ill sta along the restoration path ntil it becomes n-affected at j (i<jand j cold be node ). Path i, j is loop-free. Since the packet is n-affected at j, it remains naffected and eentall reaches its intended destination d. Again, path j, d is loop-free. It is obios that i, j does not share an intermediate node ith either s, i or j, d, since intermediate nodes in i, j belong to the restoration path. We se proof b contradiction to sho that s, i and j, d do not share an intermediate node. Assme that these to paths share node hich has an otdated SPT (see Figre 6). Node in s, i is affected b the falt link hile node in j, d is n-affected. This is a contradiction. Therefore, s, i, j, d is loop-free. To oerlapping or node-disjoint restoration paths ma be constrctedfor a link falt (; ). This occrs in the extended branch pdate algorithm hen bi-directional restoration paths initiated from and do not select the same set of intermediate nodes. After oerlapping or node-disjoint restoration paths are constrcted, there are to restoration paths for each direction. Since each packet ill se at most one restoration path, the same argment sed for the single restoration path case still applies.

7 The next to theorems sho properties related to restoration path(s) constrcted from the extended roting protocol. Theorem 3: The extended roting protocol ensres shortest restoration path(s) from to (from to ). Proof: The reslt applies to complete restoration paths (hich connect and ). Based on the extended branch pdate algorithm, each node i has pdated link state information hen it selects node i+ on the restoration path. When to restoration paths are constrcted, the are done independentl from to end nodes of the falt link. Therefore, each path is a shortest one. If one restoration path from to is constrcted from combining to (sb)paths: one from each end node of the falt link (; ), ithot loss of generalit, e assme that these to paths are merged at node. Clearl, and, are the shortest paths beteen and and beteen and, respectiel.,, is the bi-directional path formed b combining, and, and it is a shortest restoration path beteen and ith being an intermediate node. In addition, there ill be no shorter restoration path beteen and ithot sing as an intermediate node; otherise ill not be selected dring the constrction of,. The case for the restoration path from to can be proed in a similar a. Theorem 4: If a minimal restoration path is sed and a single restoration path is constrcted, the extended roting protocol garantees sch a minimal path and the nmber of nodes along the path corresponds to the minimm nmber of nodes that need to be informed of the link falt. Proof: In [7], it has been proed that the nmber of nodes in a minimal restoration path corresponds to the minimm nmber of nodes that need to be informed of the link falt ithot casing loop-free, i.e., if the nmber of nodes to be informed is less than the minimm nmber, there is alas a set of metrics for the links of the netork that ill case an scheme to create roting loops after the link failre. Let P(; ) and P(; ) be the sections of bi-directional paths beteen and and beteen and, respectiel. We onl need to proe that hen the resltant restoration path is constrcted b combining P(; ) and P(; ) at node, path P(; ; ) has the minimm nmber of nodes. Clearl, both P(; ) and P(; ) contain minimm nmbers of nodes beteen and and beteen and, respectiel. P(; ; ) is the path formed b combining P(; ) and P(; ) and it is a minimm restoration path beteen and ith being an intermediate node. In addition, there ill be no restoration path beteen and ithot sing as an intermediate node that has a feer nmber of nodes; otherise ill not be selected dring the constrction of P(; ). 5 Conclsions In this paper, e hae extended a falt-tolerant link-state roting protocol in the Internet. This approach trades optimalit for lo oerhead. A shortest path is maintained as long as it does not contains a falt link; otherise, the falt link is replaced b a shortest restoration path and the cost increase of the resltant path is pper bonded b the cost difference beteen the shortest restoration path and the falt link. Or approach is based the premises that link falts are bi-directional. Therefore, instead of constrcting to ni-directional restoration paths (one from each end node of a falt link), one bi-directional restoration path is constrcted. Or ftre ork incldes inestigating other possible trade-offs beteen optimalit and lo oerhead. Different trade-offs ill be backed p throgh simlation std. Like Naraez approach the proposed approach can garantee loop-free roting onl hen one failre occrs at a time in the netork. The efficient a of handling mltiple falts still remains an open problem. References [] R. Callon. Use of OSI IS-IS for roting in TCP/IP and dal enironments. RFC-95, Dec. 9, 990. [2] D.E.Comer. Internetorking ith TCP/IP. Prentice Hall, Inc. ol., 2nd Edition, 99. [3] E. W. Dijkstra. A note on to problems in conexion ith graphs. Nmerische Mathematik. ol., 959, pp [4] C.Hitema. Roting in the Internet. Prentice Hall PTR. 2nd Edition, [5] J. McQillan, I. Richer, and E. Rosen. The ne roting algorithm for the ARPANET. IEEE Transactions on Commnications. ol. COM-28, no. 5, Ma 980, pp [6] J. Mo. OSPF ersion 2. Internet Draft, RFC-278, Jl 997. [7] P. Naraez, K.-Y. Si, and H.-Y. Tzeng. Falt-tolerant roting in the internet ithot flooding. in Dependable Netork Compting, Aersk (ed.), Kler Academic Pblishers, 2000, pp [8] R. Perlman. A comparison beteen to roting protocols: OSPF and IS-IS. IEEE Netorks. ol.5, Sept. 99, pp [9] M. Streenstrp. Roting in Commnications Netorks. Prentice Hall. 995.

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Introdction (forarding and roting) Reie of qeeing theor Roting algorithms Link state, Distance Vector Roter design and operation IP: Internet Protocol IP4 (datagram format, addressing, ICMP,

More information

Mobility Control and Its Applications in Mobile Ad Hoc Networks

Mobility Control and Its Applications in Mobile Ad Hoc Networks Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai Department of Compter Science and Engineering Florida Atlantic Uniersity Boca Raton, FL 3331 Abstract Most existing localized

More information

Network layer. Two Key Network-Layer Functions. Datagram Forwarding table. IP datagram format. IP Addressing: introduction

Network layer. Two Key Network-Layer Functions. Datagram Forwarding table. IP datagram format. IP Addressing: introduction Netork laer transport segment sending to receiing host on sending side encapslates segments into grams on rcing side, deliers segments to transport laer laer protocols in eer host, roter roter eamines

More information

Assignments. Computer Networks LECTURE 7 Network Layer: Routing and Addressing. Network Layer Function. Internet Architecture

Assignments. Computer Networks LECTURE 7 Network Layer: Routing and Addressing. Network Layer Function. Internet Architecture ompter Netorks LETURE Netork Laer: Roting and ddressing ssignments Project : Web Pro Serer DUE OT Sandha Darkadas Department of ompter Science Uniersit of Rochester Internet rchitectre Bottom-p: phsical:

More information

Chapter 4: Network Layer. TDTS06 Computer networks. Chapter 4: Network Layer. Network layer. Two Key Network-Layer Functions

Chapter 4: Network Layer. TDTS06 Computer networks. Chapter 4: Network Layer. Network layer. Two Key Network-Layer Functions Chapter : Netork Laer TDTS06 Compter s Lectre : Netork laer II Roting algorithms Jose M. Peña, jospe@ida.li.se ID/DIT, LiU 009-09- Chapter goals: nderstand principles behind laer serices: laer serice models

More information

Mobility Control and Its Applications in Mobile Ad Hoc Networks

Mobility Control and Its Applications in Mobile Ad Hoc Networks Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai, Florida Atlantic Uniersity Abstract Most eisting localized protocols in mobile ad hoc netorks, sch as data commnication

More information

Chapter 5 Network Layer

Chapter 5 Network Layer Chapter Network Layer Network layer Physical layer: moe bit seqence between two adjacent nodes Data link: reliable transmission between two adjacent nodes Network: gides packets from the sorce to destination,

More information

On Plane Constrained Bounded-Degree Spanners

On Plane Constrained Bounded-Degree Spanners Algorithmica manscript No. (ill be inserted by the editor) 1 On Plane Constrained Bonded-Degree Spanners 2 3 Prosenjit Bose Rolf Fagerberg André an Renssen Sander Verdonschot 4 5 Receied: date / Accepted:

More information

Flooding. Routing: Outlook. Flooding Algorithms. Spanning Tree. Flooding

Flooding. Routing: Outlook. Flooding Algorithms. Spanning Tree. Flooding Roting: Otlook Flooding Flooding Link-State: complete, global knoledge Distance-Vector: iteratie, distribted calclation Goal: To distribte a packet in the hole netork (i.e. to realie a netork-ide broadcast)

More information

On Plane Constrained Bounded-Degree Spanners

On Plane Constrained Bounded-Degree Spanners On Plane Constrained Bonded-Degree Spanners Prosenjit Bose 1, Rolf Fagerberg 2, André an Renssen 1, Sander Verdonschot 1 1 School of Compter Science, Carleton Uniersity, Ottaa, Canada. Email: jit@scs.carleton.ca,

More information

The Disciplined Flood Protocol in Sensor Networks

The Disciplined Flood Protocol in Sensor Networks The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab

More information

[1] Hopcroft, J., D. Joseph and S. Whitesides, Movement problems for twodimensional

[1] Hopcroft, J., D. Joseph and S. Whitesides, Movement problems for twodimensional Acknoledgement. The athors thank Bill Lenhart for interesting discssions on the recongration of rlers. References [1] Hopcroft, J., D. Joseph and S. Whitesides, Moement problems for todimensional linkages,

More information

Rectangle-of-influence triangulations

Rectangle-of-influence triangulations CCCG 2016, Vancoer, British Colmbia, Ag 3 5, 2016 Rectangle-of-inflence trianglations Therese Biedl Anna Lbi Saeed Mehrabi Sander Verdonschot 1 Backgrond The concept of rectangle-of-inflence (RI) draings

More information

Chapter 7 TOPOLOGY CONTROL

Chapter 7 TOPOLOGY CONTROL Chapter TOPOLOGY CONTROL Oeriew Topology Control Gabriel Graph et al. XTC Interference SINR & Schedling Complexity Distribted Compting Grop Mobile Compting Winter 00 / 00 Distribted Compting Grop MOBILE

More information

Fixed-Parameter Algorithms for Cluster Vertex Deletion

Fixed-Parameter Algorithms for Cluster Vertex Deletion Fixed-Parameter Algorithms for Clster Vertex Deletion Falk Hüffner Christian Komsieicz Hannes Moser Rolf Niedermeier Institt für Informatik, Friedrich-Schiller-Uniersität Jena, Ernst-Abbe-Platz 2, D-07743

More information

Non-convex Representations of Graphs

Non-convex Representations of Graphs Non-conex Representations of Graphs Giseppe Di Battista, Fabrizio Frati, and Marizio Patrignani Dip. di Informatica e Atomazione Roma Tre Uniersity Abstract. We sho that eery plane graph admits a planar

More information

Queries. Inf 2B: Ranking Queries on the WWW. Suppose we have an Inverted Index for a set of webpages. Disclaimer. Kyriakos Kalorkoti

Queries. Inf 2B: Ranking Queries on the WWW. Suppose we have an Inverted Index for a set of webpages. Disclaimer. Kyriakos Kalorkoti Qeries Inf B: Ranking Qeries on the WWW Kyriakos Kalorkoti School of Informatics Uniersity of Edinbrgh Sppose e hae an Inerted Index for a set of ebpages. Disclaimer I Not really the scenario of Lectre.

More information

Step N' D(v),p(v) D(w),p(w) D(x),p(x) D(y),p(y) D(z),p(z) 0 u 7,u 3,u 5,u. N (uw) update D(v), D(x), D(y), D(z)

Step N' D(v),p(v) D(w),p(w) D(x),p(x) D(y),p(y) D(z),p(z) 0 u 7,u 3,u 5,u. N (uw) update D(v), D(x), D(y), D(z) Dijsktra s lgorithm Initialiation: N' = {s} for all nodes n If n adjacent to s then D(n) = c(s,n) 6 else D(n) = 8 Loop 9 Find m not in N' sch that D(m) is a minimm 0 dd m to N' pdate D(m) for all n adjacent

More information

On the complexity of Submap Isomorphism

On the complexity of Submap Isomorphism On the compleit of Sbmap Isomorphism Christine Solnon 1,2, Gillame Damiand 1,2, Colin de la Higera 3, and Jean-Christophe Janodet 4 1 INSA de Lon, LIRIS, UMR 5205 CNRS, 69621 Villerbanne, France 2 Université

More information

Select-and-Protest-based Beaconless Georouting with Guaranteed Delivery in Wireless Sensor Networks

Select-and-Protest-based Beaconless Georouting with Guaranteed Delivery in Wireless Sensor Networks Select-and-Protest-based Beaconless Georoting ith Garanteed Deliery in Wireless Sensor Netorks Hanna Kalosha, Amiya Nayak, Stefan Rührp, Ian Stojmenoić School of Information Technology and Engineering

More information

Math 365 Wednesday 4/10/ & 10.2 Graphs

Math 365 Wednesday 4/10/ & 10.2 Graphs Math 365 Wednesda 4/10/19 10.1 & 10.2 Graphs Eercise 44. (Relations and digraphs) For each the relations in Eercise 43(a), dra the corresponding directed graph here V = {0, 1, 2, 3} and a! b if a b. What

More information

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation Maximal Cliqes in Unit Disk Graphs: Polynomial Approximation Rajarshi Gpta, Jean Walrand, Oliier Goldschmidt 2 Department of Electrical Engineering and Compter Science Uniersity of California, Berkeley,

More information

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing 1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity

More information

Localized Delaunay Triangulation with Application in Ad Hoc Wireless Networks

Localized Delaunay Triangulation with Application in Ad Hoc Wireless Networks 1 Localized Delanay Trianglation with Application in Ad Hoc Wireless Networks Xiang-Yang Li Gria Călinesc Peng-Jn Wan Y Wang Department of Compter Science, Illinois Institte of Technology, Chicago, IL

More information

Combinatorial and Geometric Properties of Planar Laman Graphs

Combinatorial and Geometric Properties of Planar Laman Graphs Combinatorial and Geometric Properties of Planar Laman Graphs Stephen Koboro 1, Torsten Ueckerdt 2, and Kein Verbeek 3 1 Department of Compter Science, Uniersity of Arizona 2 Department of Applied Mathematics,

More information

Fault Tolerance in Hypercubes

Fault Tolerance in Hypercubes Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different

More information

CS 557 Lecture IX. Drexel University Dept. of Computer Science

CS 557 Lecture IX. Drexel University Dept. of Computer Science CS 7 Lectre IX Dreel Uniersity Dept. of Compter Science Fall 00 Shortest Paths Finding the Shortest Paths in a graph arises in many different application: Transportation Problems: Finding the cheapest

More information

Isolates: Serializability Enforcement for Concurrent ML

Isolates: Serializability Enforcement for Concurrent ML Prde Uniersity Prde e-pbs Department of Compter Science Technical Reports Department of Compter Science 2010 Isolates: Serializability Enforcement for Concrrent ML Lkasz Ziarek Prde Uniersity, lziarek@cs.prde.ed

More information

Multi-Way Search Tree ( ) (2,4) Trees. Multi-Way Inorder Traversal. Multi-Way Search Tree ( ) Multi-Way Searching. Multi-Way Searching

Multi-Way Search Tree ( ) (2,4) Trees. Multi-Way Inorder Traversal. Multi-Way Search Tree ( ) Multi-Way Searching. Multi-Way Searching Mlti-Way Search Tree ( 0..) (,) Trees 9 5 7 0 (,) Trees (,) Trees Mlti-Way Search Tree ( 0..) A mlti-ay search tree is an ordered tree sch that Each internal node has at least to children and stores d

More information

Real-Time Robot Path Planning via a Distance-Propagating Dynamic System with Obstacle Clearance

Real-Time Robot Path Planning via a Distance-Propagating Dynamic System with Obstacle Clearance POSTPRINT OF: IEEE TRANS. SYST., MAN, CYBERN., B, 383), 28, 884 893. 1 Real-Time Robot Path Planning ia a Distance-Propagating Dynamic System with Obstacle Clearance Allan R. Willms, Simon X. Yang Member,

More information

v e v 1 C 2 b) Completely assigned T v a) Partially assigned Tv e T v 2 p k

v e v 1 C 2 b) Completely assigned T v a) Partially assigned Tv e T v 2 p k Approximation Algorithms for a Capacitated Network Design Problem R. Hassin 1? and R. Rai 2?? and F. S. Salman 3??? 1 Department of Statistics and Operations Research, Tel-Ai Uniersity, Tel Ai 69978, Israel.

More information

COMPOSITION OF STABLE SET POLYHEDRA

COMPOSITION OF STABLE SET POLYHEDRA COMPOSITION OF STABLE SET POLYHEDRA Benjamin McClosky and Illya V. Hicks Department of Comptational and Applied Mathematics Rice University November 30, 2007 Abstract Barahona and Mahjob fond a defining

More information

arxiv: v2 [cs.cg] 5 Aug 2014

arxiv: v2 [cs.cg] 5 Aug 2014 The θ 5 -graph is a spanner Prosenjit Bose Pat Morin André van Renssen Sander Verdonschot November 5, 2018 arxiv:12120570v2 [cscg] 5 Ag 2014 Abstract Given a set of points in the plane, e sho that the

More information

Complete Information Pursuit Evasion in Polygonal Environments

Complete Information Pursuit Evasion in Polygonal Environments Complete Information Prsit Easion in Polygonal Enironments Kyle Klein and Sbhash Sri Department of Compter Science Uniersity of California Santa Barbara, CA 9306 Abstract Sppose an npredictable eader is

More information

Cutting Cycles of Rods in Space: Hardness and Approximation

Cutting Cycles of Rods in Space: Hardness and Approximation Ctting Cycles of Rods in Space: Hardness and pproximation oris rono ark de erg Chris Gray Elena mford bstract We stdy the problem of ctting a set of rods (line segments in R 3 ) into fragments, sing a

More information

Reconstructing Generalized Staircase Polygons with Uniform Step Length

Reconstructing Generalized Staircase Polygons with Uniform Step Length Jornal of Graph Algorithms and Applications http://jgaa.info/ ol. 22, no. 3, pp. 431 459 (2018) DOI: 10.7155/jgaa.00466 Reconstrcting Generalized Staircase Polygons with Uniform Step Length Nodari Sitchinaa

More information

Path Planning in Partially-Known Environments. Prof. Brian Williams (help from Ihsiang Shu) /6.834 Cognitive Robotics February 17 th, 2004

Path Planning in Partially-Known Environments. Prof. Brian Williams (help from Ihsiang Shu) /6.834 Cognitive Robotics February 17 th, 2004 Path Planning in Partially-Known Enironments Prof. Brian Williams (help from Ihsiang Sh) 16.41/6.834 Cognitie Robotics Febrary 17 th, 004 Otline Path Planning in Partially Known Enironments. Finding the

More information

(2, 4) Tree Example (2, 4) Tree: Insertion

(2, 4) Tree Example (2, 4) Tree: Insertion Presentation for se with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 B-Trees and External Memory (2, 4) Trees Each internal node has 2 to 4 children:

More information

On shortest-path all-optical networks without wavelength conversion requirements

On shortest-path all-optical networks without wavelength conversion requirements Research Collection Working Paper On shortest-path all-optical networks withot waelength conersion reqirements Athor(s): Erlebach, Thomas; Stefanakos, Stamatis Pblication Date: 2002 Permanent Link: https://doi.org/10.3929/ethz-a-004446054

More information

A Unified Energy-Efficient Topology for Unicast and Broadcast

A Unified Energy-Efficient Topology for Unicast and Broadcast A Unified Energy-Efficient Topology for Unicast and Broadcast Xiang-Yang Li Dept. of Compter Science Illinois Institte of Technology, Chicago, IL, USA xli@cs.iit.ed Wen-Zhan Song School of Eng. & Comp.

More information

Towards Tight Bounds on Theta-Graphs

Towards Tight Bounds on Theta-Graphs Toards Tight Bonds on Theta-Graphs arxiv:10.633v1 [cs.cg] Apr 01 Prosenjit Bose Jean-Lo De Carfel Pat Morin André van Renssen Sander Verdonschot Abstract We present improved pper and loer bonds on the

More information

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP Chapter 4: outline 4. introduction 4. irtual circuit and datagram networks 4. what s inside a router 4.4 IP: Internet Protocol datagram format IP4 addressing ICMP IP6 4.5 routing algorithms link state

More information

Drawing Outer-Planar Graphs in O(n log n) Area

Drawing Outer-Planar Graphs in O(n log n) Area Draing Oter-Planar Graphs in O(n log n) Area Therese Biedl School of Compter Science, Uniersity of Waterloo, Waterloo, ON N2L 3G1, Canada, biedl@aterloo.ca Abstract. In this paper, e stdy draings of oter-planar

More information

Constructing and Comparing User Mobility Profiles for Location-based Services

Constructing and Comparing User Mobility Profiles for Location-based Services Constrcting and Comparing User Mobility Profiles for Location-based Services Xihi Chen Interdisciplinary Centre for Secrity, Reliability and Trst, University of Lxemborg Jn Pang Compter Science and Commnications,

More information

Triangle Contact Representations

Triangle Contact Representations Triangle Contact Representations Stean Felsner elsner@math.t-berlin.de Technische Uniersität Berlin, Institt ür Mathematik Strasse des 7. Jni 36, 0623 Berlin, Germany Abstract. It is conjectred that eery

More information

Prof. Kozyrakis. 1. (10 points) Consider the following fragment of Java code:

Prof. Kozyrakis. 1. (10 points) Consider the following fragment of Java code: EE8 Winter 25 Homework #2 Soltions De Thrsday, Feb 2, 5 P. ( points) Consider the following fragment of Java code: for (i=; i

More information

Pushing squares around

Pushing squares around Pshing sqares arond Adrian Dmitresc János Pach Ý Abstract We stdy dynamic self-reconfigration of modlar metamorphic systems. We garantee the feasibility of motion planning in a rectanglar model consisting

More information

Chapter 5. Plane Graphs and the DCEL

Chapter 5. Plane Graphs and the DCEL Chapter 5 Plane Graphs and the DCEL So far we hae been talking abot geometric strctres sch as trianglations of polygons and arrangements of line segments withot paying mch attention to how to represent

More information

NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS

NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS ETWORK PRESERVATIO THROUGH A TOPOLOGY COTROL ALGORITHM FOR WIRELESS MESH ETWORKS F. O. Aron, T. O. Olwal, A. Krien, Y. Hamam Tshwane University of Technology, Pretoria, Soth Africa. Dept of the French

More information

Tdb: A Source-level Debugger for Dynamically Translated Programs

Tdb: A Source-level Debugger for Dynamically Translated Programs Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,

More information

h-vectors of PS ear-decomposable graphs

h-vectors of PS ear-decomposable graphs h-vectors of PS ear-decomposable graphs Nima Imani 2, Lee Johnson 1, Mckenzie Keeling-Garcia 1, Steven Klee 1 and Casey Pinckney 1 1 Seattle University Department of Mathematics, 901 12th Avene, Seattle,

More information

IP Multicast Fault Recovery in PIM over OSPF

IP Multicast Fault Recovery in PIM over OSPF 1 IP Mlticast Falt Recovery in PIM over OSPF Abstract Relatively little attention has been given to nderstanding the falt recovery characteristics and performance tning of native IP mlticast networks.

More information

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read. The final path PC 4 Add Reg Shift left 2 Add PCSrc Instrction [3-] Instrction I [25-2] I [2-6] I [5 - ] register register 2 register 2 Registers ALU Zero Reslt ALUOp em Data emtor RegDst ALUSrc em I [5

More information

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un Dynamic Maintenance of Majority Information in Constant Time per Update? Gdmnd S. Frandsen and Sven Skym BRICS 1 Department of Compter Science, University of arhs, Ny Mnkegade, DK-8000 arhs C, Denmark

More information

Vertex Guarding in Weak Visibility Polygons

Vertex Guarding in Weak Visibility Polygons Vertex Garding in Weak Visibility Polygons Pritam Bhattacharya, Sbir Kmar Ghosh*, Bodhayan Roy School of Technology and Compter Science Tata Institte of Fndamental Research Mmbai 400005, India arxi:1409.46212

More information

5 Performance Evaluation

5 Performance Evaluation 5 Performance Evalation his chapter evalates the performance of the compared to the MIP, and FMIP individal performances. We stdy the packet loss and the latency to restore the downstream and pstream of

More information

3-DIMENSIONAL RESPONSE CHARACTERISTICS OF CONTINUOUS VIADUCT NEAR A FAULT

3-DIMENSIONAL RESPONSE CHARACTERISTICS OF CONTINUOUS VIADUCT NEAR A FAULT 13 th World Conference on Earthqake Engineering Vancoer, B.C., Canada Agst 1-6, 24 Paper No. 367 3-DIMENSIONAL RESPONSE CHARACTERISTICS OF CONTINUOUS VIADUCT NEAR A FAULT Kotak OHO 1, Takanori HARADA 2

More information

arxiv: v1 [cs.cg] 27 Nov 2015

arxiv: v1 [cs.cg] 27 Nov 2015 On Visibility Representations of Non-planar Graphs Therese Biedl 1, Giseppe Liotta 2, Fabrizio Montecchiani 2 David R. Cheriton School of Compter Science, University of Waterloo, Canada biedl@waterloo.ca

More information

Friend of My Friend: Network Formation with Two-Hop Benefit

Friend of My Friend: Network Formation with Two-Hop Benefit Friend of My Friend: Network Formation with Two-Hop Benefit Elliot Ansheleich, Onkar Bhardwaj, and Michael Usher Rensselaer Polytechnic Institte, Troy NY, USA Abstract. How and why people form ties is

More information

Evaluating Influence Diagrams

Evaluating Influence Diagrams Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will

More information

Visibility-Graph-based Shortest-Path Geographic Routing in Sensor Networks

Visibility-Graph-based Shortest-Path Geographic Routing in Sensor Networks Athor manscript, pblished in "INFOCOM 2009 (2009)" Visibility-Graph-based Shortest-Path Geographic Roting in Sensor Networks Gang Tan Marin Bertier Anne-Marie Kermarrec INRIA/IRISA, Rennes, France. Email:

More information

Assigning AS Relationships to Satisfy the Gao-Rexford Conditions

Assigning AS Relationships to Satisfy the Gao-Rexford Conditions Assigning AS Relationships to Satisfy the Gao-Rexford Conditions Lca Cittadini, Giseppe Di Battista, Thomas Erlebach, Marizio Patrignani, and Massimo Rimondini Dept. of Compter Science and Atomation, Roma

More information

Real-Time Implementation of Adaptive Optimal Controller Based on a Pseudo-Space Model into PLC

Real-Time Implementation of Adaptive Optimal Controller Based on a Pseudo-Space Model into PLC Proceedings of the th WSEAS International Conference on SYSEMS, Agios Nikolaos, Crete Island, Greece, Jl 3-5, 7 3 Real-ime Implementation of Adaptive Optimal Controller Based on a Psedo-Space Model into

More information

circuit simulation NP-complete? backward retiming forward retiming f(x)

circuit simulation NP-complete? backward retiming forward retiming f(x) Optimal FPGA Mapping and Retiming with Ecient Initial State Comptation Jason Cong and Chang W Department of Compter Science Uniersity of California, Los Angeles, CA 995 Abstract For seqential circits with

More information

Embeddings of cubic Halin graphs: Genus distributions

Embeddings of cubic Halin graphs: Genus distributions Also aailable at http://amc.imfm.si ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 6 (2013) 37 56 Embeddings of cbic Halin graphs: Gens distribtions Jonathan

More information

Multiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET

Multiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET Mltiple-Choice Test Chapter 09.0 Golden Section Search Method Optimization COMPLETE SOLUTION SET. Which o the ollowing statements is incorrect regarding the Eqal Interval Search and Golden Section Search

More information

Constructing Multiple Light Multicast Trees in WDM Optical Networks

Constructing Multiple Light Multicast Trees in WDM Optical Networks Constrcting Mltiple Light Mlticast Trees in WDM Optical Networks Weifa Liang Department of Compter Science Astralian National University Canberra ACT 0200 Astralia wliang@csaneda Abstract Mlticast roting

More information

arxiv: v1 [cs.cg] 1 Feb 2016

arxiv: v1 [cs.cg] 1 Feb 2016 The Price of Order Prosenjit Bose Pat Morin André van Renssen, arxiv:160.00399v1 [cs.cg] 1 Feb 016 Abstract We present tight bonds on the spanning ratio of a large family of ordered θ-graphs. A θ-graph

More information

Planarity-Preserving Clustering and Embedding for Large Planar Graphs

Planarity-Preserving Clustering and Embedding for Large Planar Graphs Planarity-Presering Clstering and Embedding for Large Planar Graphs Christian A. Dncan, Michael T. Goodrich, and Stephen G. Koboro Center for Geometric Compting The Johns Hopkins Uniersity Baltimore, MD

More information

Nonempty Intersection of Longest Paths in Series-Parallel Graphs

Nonempty Intersection of Longest Paths in Series-Parallel Graphs Nonempty Intersection of Longest aths in Series-arallel Graphs Jlia Ehrenmüller 1,, Cristina G. Fernandes 2,, and Carl Georg Heise 1,, 1 Institt für Mathematik, Technische Uniersität Hambrg-Harbrg, Germany,

More information

Multiple Source Shortest Paths in a Genus g Graph

Multiple Source Shortest Paths in a Genus g Graph Mltiple Sorce Shortest Paths in a Gens g Graph Sergio Cabello Erin W. Chambers Abstract We gie an O(g n log n) algorithm to represent the shortest path tree from all the ertices on a single specified face

More information

IOGP: An Incremental Online Graph Partitioning Algorithm for Distributed Graph Databases

IOGP: An Incremental Online Graph Partitioning Algorithm for Distributed Graph Databases : An Incremental Online Graph Partitioning Algorithm for Distribted Graph Databases Dong Dai Texas Tech University Lbbock, Texas dong.dai@tt.ed Wei Zhang Texas Tech University Lbbock, Texas X-Spirit.zhang@tt.ed

More information

Alliances and Bisection Width for Planar Graphs

Alliances and Bisection Width for Planar Graphs Alliances and Bisection Width for Planar Graphs Martin Olsen 1 and Morten Revsbæk 1 AU Herning Aarhs University, Denmark. martino@hih.a.dk MADAGO, Department of Compter Science Aarhs University, Denmark.

More information

A Distributed Algorithm for Deadlock Detection and Resolution

A Distributed Algorithm for Deadlock Detection and Resolution A Distribted Algorithm for Deadlock Detection and Resoltion Don P. Mitchell Michael J. Merritt AT&T Bell Laboratories ABSTRACT This aer resents two distribted algorithms for detecting and resoling deadlocks.

More information

Optimization and Translation of Tableau-Proofs. Abstract: Dierent kinds of logical calculi have dierent advantages and disadvantages.

Optimization and Translation of Tableau-Proofs. Abstract: Dierent kinds of logical calculi have dierent advantages and disadvantages. J. Inform. Process. Cybernet. EIK?? (199?), (formerly: Elektron. Inform.verarb. Kybernet.) Optimization and Translation of Tablea-Proofs into Resoltion By Andreas Wolf, Berlin Abstract: Dierent kinds of

More information

Networks An introduction to microcomputer networking concepts

Networks An introduction to microcomputer networking concepts Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES

More information

The single-cycle design from last time

The single-cycle design from last time lticycle path Last time we saw a single-cycle path and control nit for or simple IPS-based instrction set. A mlticycle processor fies some shortcomings in the single-cycle CPU. Faster instrctions are not

More information

Object Pose from a Single Image

Object Pose from a Single Image Object Pose from a Single Image How Do We See Objects in Depth? Stereo Use differences between images in or left and right eye How mch is this difference for a car at 00 m? Moe or head sideways Or, the

More information

arxiv: v3 [math.co] 7 Sep 2018

arxiv: v3 [math.co] 7 Sep 2018 Cts in matchings of 3-connected cbic graphs Kolja Knaer Petr Valicov arxiv:1712.06143v3 [math.co] 7 Sep 2018 September 10, 2018 Abstract We discss conjectres on Hamiltonicity in cbic graphs (Tait, Barnette,

More information

4.13 Advanced Topic: An Introduction to Digital Design Using a Hardware Design Language 345.e1

4.13 Advanced Topic: An Introduction to Digital Design Using a Hardware Design Language 345.e1 .3 Advanced Topic: An Introdction to Digital Design Using a Hardware Design Langage 35.e.3 Advanced Topic: An Introdction to Digital Design Using a Hardware Design Langage to Describe and odel a Pipeline

More information

Towards applications based on measuring the orbital angular momentum of light

Towards applications based on measuring the orbital angular momentum of light CHAPTER 8 Towards applications based on measring the orbital anglar momentm of light Efficient measrement of the orbital anglar momentm (OAM) of light has been a longstanding problem in both classical

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY 2007 1 On the Analysis of the Bletooth Time Division Dplex Mechanism Gil Zssman Member, IEEE, Adrian Segall Fellow, IEEE, and Uri Yechiali

More information

Efficient and Accurate Delaunay Triangulation Protocols under Churn

Efficient and Accurate Delaunay Triangulation Protocols under Churn Efficient and Accrate Delanay Trianglation Protocols nder Chrn Dong-Yong Lee and Simon S. Lam Department of Compter Sciences The University of Texas at Astin {dylee, lam}@cs.texas.ed November 9, 2007 Technical

More information

Improving Network Connectivity Using Trusted Nodes and Edges

Improving Network Connectivity Using Trusted Nodes and Edges Improing Network Connectiity Using Trsted Nodes and Edges Waseem Abbas, Aron Laszka, Yegeniy Vorobeychik, and Xenofon Kotsokos Abstract Network connectiity is a primary attribte and a characteristic phenomenon

More information

Authors. Tamilnadu, India 2.

Authors.   Tamilnadu, India 2. International Jornal of Emerging Trends in Science and Technology Impact Factor: 2.838 DOI: http://dx.doi.org/10.18535/ijetst/3i03.04 Irredndant Complete Domination Nmber of Graphs Athors A.Nellai Mrgan

More information

ABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS

ABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS Proceedings th FIG Symposim on Deformation Measrements Santorini Greece 00. ABSOUTE DEFORMATION PROFIE MEASUREMENT IN TUNNES USING REATIVE CONVERGENCE MEASUREMENTS Mahdi Moosai and Saeid Khazaei Mining

More information

Ethernet Basics Learning Switches. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

Ethernet Basics Learning Switches. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers Ethernet Basics Learning Sitches based on Chapter 4 of CompTIA Netork+ Eam Guide, 4 th ed., Mike Meers Sitch Forarding A sitch forards frames based on destination MAC address Ho does the sitch kno hich

More information

tpa, bq a b is a multiple of 5 u tp0, 0q, p0, 5q, p0, 5q,...,

tpa, bq a b is a multiple of 5 u tp0, 0q, p0, 5q, p0, 5q,..., A binar relation on a set A is a sbset of A ˆ A, hereelements pa, bq are ritten as a b. For eample, let A Z, so A ˆ A tpn, mq n, m P Z. Let be the binar relation gien b a b if and onl if a and b hae the

More information

Internet Technology. 08. Routing. Paul Krzyzanowski. Rutgers University. Spring CS Paul Krzyzanowski

Internet Technology. 08. Routing. Paul Krzyzanowski. Rutgers University. Spring CS Paul Krzyzanowski Internet Technolog 08. Routing Paul Kranoski Rutgers Universit Spring 06 March, 06 CS 0-06 Paul Kranoski Routing algorithm goal st hop router = source router last hop router = destination router router

More information

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment

More information

Mathematical model for storing and effective processing of directed graphs in semistructured data management systems

Mathematical model for storing and effective processing of directed graphs in semistructured data management systems Mathematical model for storing and effectie processing of directed graphs in semistrctred data management MALIKOV A, GULEVSKIY Y, PARKHOMENKO D Information Systems and Technologies Department North Cacass

More information

The extra single-cycle adders

The extra single-cycle adders lticycle Datapath As an added bons, we can eliminate some of the etra hardware from the single-cycle path. We will restrict orselves to sing each fnctional nit once per cycle, jst like before. Bt since

More information

CS 251, Winter 2019, Assignment % of course mark

CS 251, Winter 2019, Assignment % of course mark CS 25, Winter 29, Assignment.. 3% of corse mark De Wednesday, arch 3th, 5:3P Lates accepted ntil Thrsday arch th, pm with a 5% penalty. (7 points) In the diagram below, the mlticycle compter from the corse

More information

TDT4255 Friday the 21st of October. Real world examples of pipelining? How does pipelining influence instruction

TDT4255 Friday the 21st of October. Real world examples of pipelining? How does pipelining influence instruction Review Friday the 2st of October Real world eamples of pipelining? How does pipelining pp inflence instrction latency? How does pipelining inflence instrction throghpt? What are the three types of hazard

More information

GETTING STARTED WITH PYGAME ON THE RASPBERRY PI

GETTING STARTED WITH PYGAME ON THE RASPBERRY PI GETTING STARTED WITH PYGAME ON THE RASPBERRY PI Worksheet And Cheat Sheet.technoisaledcation.co.k This resorce is copyright TechnoVisal Limited 2017 bt permission is gien to freely copy for edcational

More information

Constrained Routing Between Non-Visible Vertices

Constrained Routing Between Non-Visible Vertices Constrained Roting Between Non-Visible Vertices Prosenjit Bose 1, Matias Korman 2, André van Renssen 3,4, and Sander Verdonschot 1 1 School of Compter Science, Carleton University, Ottawa, Canada. jit@scs.carleton.ca,

More information

5.0 Curve and Surface Theory

5.0 Curve and Surface Theory 5. Cre and Srface Theor 5.1 arametric Representation of Cres Consider the parametric representation of a cre as a ector t: t [t t t] 5.1 The deriatie of sch a ector ealated at t t is gien b t [ t t t ]

More information

This chapter is based on the following sources, which are all recommended reading:

This chapter is based on the following sources, which are all recommended reading: Bioinformatics I, WS 09-10, D. Hson, December 7, 2009 105 6 Fast String Matching This chapter is based on the following sorces, which are all recommended reading: 1. An earlier version of this chapter

More information

Faster Random Walks By Rewiring Online Social Networks On-The-Fly

Faster Random Walks By Rewiring Online Social Networks On-The-Fly 1 Faster Random Walks By Rewiring Online ocial Networks On-The-Fly Zhojie Zho 1, Nan Zhang 2, Zhigo Gong 3, Gatam Das 4 1,2 Compter cience Department, George Washington Uniersity 1 rexzho@gw.ed 2 nzhang10@gw.ed

More information

Minimum Spanning Trees Outline: MST

Minimum Spanning Trees Outline: MST Minimm Spanning Trees Otline: MST Minimm Spanning Tree Generic MST Algorithm Krskal s Algorithm (Edge Based) Prim s Algorithm (Vertex Based) Spanning Tree A spanning tree of G is a sbgraph which is tree

More information