An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network

Size: px
Start display at page:

Download "An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network"

Transcription

1 An Efficient andove Mechanism Using the Geneal Switch Management Potocol on a Multi-Potocol abel Switching Netwok Seong Gon hoi, yun Joo Kang, and Jun Kyun hoi Using the geneal switch management potocol on a multi-potocol label switching netwok, we pesent an efficient method fo handling handoves. The poposed method diectly changes an established path into a new path fo suppoting a handove. Ou investigation eveals the effects of the poposed scheme and demonstates that this method significantly educes signaling costs and delays. Keywods: andove,, MPS. Manuscipt eceived June 9, ; evised June,. Seong Gon hoi (phone: , sgchoi@icu.ac.k) and Jun Kyun hoi ( ) ae with Boadband Netwok aboatoy, School of Engineeing, IU, Daejeon, Koea. yun Joo Kang ( hjkang@eti.e.k) is with Netwok Technology aboatoy, ETI, Daejeon, Koea. I. Intoduction Due to the inceased populaity of potable computes and wieless communications devices, mobile netwoking applications have become moe and moe popula. In the mobile envionment, the demand to povide wieless Intenet access is gowing apidly. Since mobile uses change thei locations, seveal equiements, such as lossless data tansmission, simple signaling, shot latency time, efficient handove handling, and clea location management, must be fulfilled to achieve efficient mobility. To meet these challenges, the Intenet Engineeing Task Foce (IETF) has ceated a woking goup to study the mobile IP [], and specifically, eseaches have poposed seveal multi-potocol label switching (MPS)-based mobility schemes to suppot mobility on IP netwoks. In addition, thee is a geneal switch management potocol (), which can contol MPS-based IP switches. The IETF has cuently standadized mobile IP [], and seveal ideas including mico-mobility schemes have been poposed []-[6]. Although many of those poposals ty to povide global mobility, seamless handove, fast handove, and eduction of signaling taffic, they still lack sufficient mobility suppot, especially in handove latency time. ecently, vaious eseaches have poposed MPS-based mobility schemes [7]-[]. Othe studies have aimed at impoving netwok eliability [], []. oweve, these schemes have not poved sufficient fo use in the mobile envionment because a new MPS path must be established wheneve a mobile host (M) changes its location, o multi- ETI Jounal, Volume 5, Numbe 5, Octobe Seong Gon hoi et al. 69

2 MPS paths need to be eseved fo handoves. The fome condition can cause a long latency time, and the latte can esult in a waste of esouces. plays the ole of connection management fo the geneal switching system []. is a maste/slave potocol, whee an MPS-based oute can be the slave, and it allows the maste (o contolle) to establish and elease connections and to manage a pot. In addition, the potocol allows the slave to infom the contolle if something inteesting, such as a link attachment, happens on the slave. In this way, if a handove occus, the slave (an MPSbased oute) can infom the contolle of an attachment o detachment of an M. Thus, if the is used fo mobility suppot, the mobility can be efficiently handled, and the handove latency time can be educed. In this pape, we popose a method to educe handove latency time by using the on an MPS netwok. The geneal method of ou poposal is that if an M moves fom one cell to anothe, the contolle eceives event messages coesponding to the attachment message fom the new slave and the detachment message fom the old slave. The contolle then diectly changes the MPS path at the cossove label switched oute (S) by using the outing table in the contolle. This esults in the advantage of a low handove latency time. This pape is oganized as follows. Section II descibes elated wok. In section III, we intoduce a -based mobility management pocedue on the MPS netwok fo suppoting mobility. Pefomance analysis and its esults ae pesented in section IV. Section V consists of the conclusion and poposed futhe study. II. elated Wok In this section, we look into seveal existing elated studies. These consist of oveviews of the basic Mobile IP achitectues followed by thei extensions. In addition, we also simply intoduce the.. Mobile IP Mobile IP [] is a well known appoach fo mobility suppot in IP netwoks and an accepted standad in the IETF community. The objective of mobile IP is to suppot mobility in a pue netwok laye. Especially, it aims at maintaining connections even when handoves cause IP addess changes. The fundamental assumption in mobile IP is that an M has an IP home addess and gets a tempoay cae-of-addess (oa) in a foeign netwok. A coespondent node (N) addesses the M via its IP home addess. Mobile IP has two instances, a home agent (A) and a foeign agent (FA). outing is pefomed by addess tanslation and tunneling. When the N ties to send packets to the mobile host, it sends them to its A fist. In tun, the A intecepts and tunnels the packets to the oa of the M. To tunnel a packet, the packets ae encapsulated by the A. The FA decapsulates the packets and fowads them via local mechanisms to the mobile host. Fo the evese diection fom the M to the N, the M is allowed to send packets diectly. This is efeed to as tiangula outing. The mobile IP standad [] specifies a geneal handove potocol fo the Intenet. It equies that the home netwok of the M be notified of evey change of location. These location updates incu a latency in taveling to distant home netwoks and communicating hosts. They also add taffic to the wide aea potion of the intenetwok. As cuently defined, theefoe, mobile IP does not extend well to lage numbes of potable devices moving fequently between small cells.. Mico-Mobility Existing poposals fo mico-mobility can be boadly classified into two types: tunnel-based and outing-based schemes, and they ae summaized well in []. Tunnel-based mico-mobility schemes include mobile IP egional egistation. It uses the idea of a gateway foeign agent (GFA). The M egistes the GFA as the FA. In this way, mobility within the subnet of the GFA does not equie a eegistation with the emote A and is achieved by a local egistation with the GFA, thus esulting in deceased signaling ovehead and latency. A fowading enty fo the mobile host is necessay at the GFA(s), and the est of the nodes in the netwok ae oblivious to the mobility management. AWAII [5] and cellula IP (IP) [6], which ae outingbased schemes, maintain egula IP fowading pocesses to povide obustness within a domain and also eliminate the tunnel ovehead. A domain has one oot node poviding the outable addess and acting as an FA fo all Ms in its scope. In this case, changing outing table enties in all coesponding nodes can suppot the mobility between two access outes. The limitation of these schemes is that a lage numbe of nodes in the domain need to maintain fowading enties fo all Ms. This means that all nodes need to maintain a flat addess lookup table that contains enties fo all Ms in the domain, so evey node in the domain has to implement the potocol, peventing gadual deployment.. MPS-Based Schemes Seveal studies have pesented MPS-based mobility schemes [7]-[]. In one fom o anothe, MPS-based 7 Seong Gon hoi et al. ETI Jounal, Volume 5, Numbe 5, Octobe

3 AP A S B S D S F S I M N S A S E S J S S FA AP Fig.. MPS-based mobile netwok. schemes use the idea of a label switched path (SP). Guo et al. [7] pesented an IP tanspot scheme fo thid geneation adio access netwoks based on an MPS. Its basic idea was to establish and manage SP(s) fo inteconnecting APs and adio netwok contolles. This poposal also explained tanspot beas to suppot bandwidth povisioning and a vaiety of quality of sevice (QoS) equiements in the adio access netwok well. oweve, thei study failed to explain mobility, such as handoves. The integation scheme of mobile IP and MPS [8] uses a typical mobile IP concept fo mobility. As Fig. shows, if an M changes its S by a handove, then the FA (S J) and the A (S I) of the M must give and take the egistation equest and egistation eply messages as shown in Fig.. The A will then send a label equest using the label distibution potocol (DP) to the FA with a oa as a fowading equivalent class (FE). The FA eplies with an DP label mapping message to the A. When this label mapping message aives at the A, the SP is established. Afte that, the A updates its label table and sends a egistation eply message to the FA along the SP fom the A to the FA. onsequently, the egistation pocess by handove may equie a long latency time at the egistation pocess by a handove. If the A is in a diffeent netwok, which is connected to the FA with moe hops, it takes a longe handove latency time. Kim et al. poposed a mobility-awae MPS scheme [9] to impove the deficiencies in the mobile IP. This poposal povided an efficient mico-mobility with continuous QoS suppot by combining the advantages of the MPS, such as IP QoS suppot, with the advantages of host-based mico-mobility schemes, such as low-latency handoves. Fo those capabilities, this scheme used a domain-based appoach to addess micomobility management. Each access MPS domain has one gateway node. Within a wieless access MPS domain, multiple SPs ae fomed between each AP and a gateway to M egistation equest egistation eply FA S J Modify outing table egistation equest egistation eply A S I SP setup Modify label table Fig.. egistation pocedue in a foeign netwok. suppot multiple FEs, and the gateway maintains the packet fowading table. This scheme can esult in waste of esouces. The label edge mobility agent (EMA)-based MPS poposal [] had some advantages, such as a distibuted and scalable natue, the ability to povide fo QoS though taffic engineeing, ease of gadual deployment, and efficient design and handove pefomance. One of the key diffeentiating factos of this scheme is that the mobile has the flexibility to ceate its own hieachy of agents based on its mobility patten, the bandwidth availability in the netwok, and othe factos. Although this scheme has moe advantages than othe hieachical mobility schemes, it also has moe signaling taffic fo suppoting handoves by using the EMA concept. This means that even though an M changes its EMA within the same administative domain by handove, seveal signaling messages, such as ediect equest, ediect confim, and binding update towad the A, occu if it is an uppe level EMA. ETI Jounal, Volume 5, Numbe 5, Octobe Seong Gon hoi et al. 7

4 . ee we povide an intoduction to the. It is impotant to ealize that IP switching is essentially independent of the, and vice vesa. The is used solely to contol a switch (e.g., an MPS-based oute) []. The consists of a contolle and a slave. The contolle could be any geneal-pupose compute. The potocol allows the contolle to Public Netwok Administative Domain BG BG S AS AS S G S AS AP Establish and elease connections, Add and delete leaves, Pefom pot management, equest data (configuation infomation, statistics). In addition, the potocol allows the slave to infom the contolle if something inteesting happens on the switch. The contains some messages fo statistics gatheing, e.g., geneal pot and switch management. Thee ae six classes of equest/esponse messages: connection management, pot management, state and statistics, configuation, esevation management, and QoS. The slave can infom the contolle of an attachement o detachment of an M by using the messages if a handove occus, so when the is used fo mobility suppot, we can efficiently handle the mobility, and the handove latency time can be educed. In addition, if an M changes its AP within the same administative domain, it does not need to infom its A of the handove. In this way, the contolle can change the MPS path by diectly modifying the label infomation at the cossove S on the MPS netwok. BG: Bode Gateway AP: Access Point S : abel Switched oute AS: Access abel Switched oute G: ontolle Fig.. Mobile netwok model in an MPS domain. III. -Based Mobility Management Pocedue fo Suppoting Mobility We appoach mobility management on an MPS netwok using the and mainly deal with the handove pocess. We conside the netwok achitectue of Fig., whee the administative domain unde consideation uses MPS and the. Each access MPS domain has one contolle node. The contolle is connected with all outes, which ae logically slaves. An M communicates with one o moe access points (APs) that ae connected to access Ss (ASs). We apply ou scheme in an MPS domain fo a micomobility solution. Within an MPS domain, SPs ae fomed between each AP and a bode gateway (BG). Multiple SPs ontolle ontolle - VS VS M N S A S B S D S E S F S I S J S S SP SP VS : Vitual Switch ontol (ex, inteface) - :ontolle to ontolle Inteface Fig.. An achitectue using on an MPS netwok. 7 Seong Gon hoi et al. ETI Jounal, Volume 5, Numbe 5, Octobe

5 ae ceated between an AP and a BG to suppot multiple FEs that can be mapped to signaling taffic and diffeent classes, and SPs ae newly established between the BGs and the APs. If the public netwok is an MPS netwok, the BGs ae edge Ss. Fom now, we assume that a public netwok is also an MPS netwok. The contolle is connected to each slave (Fig. ), so all infomation about the SPs can be sent to the contolle. Seveal key diffeentiating factos of this scheme, as opposed to othe hieachical and MPS-based mobility schemes, ae as follows: all infomation about SPs can be sent to the contolle and stoed using the. An M s handove can be detected at the contolle via a slave. If a handove occus, contolle can easily announce the SP elease to the old S I and also establish a new path towad S J at the cossove oute () using stoed SPs infomation in the contolle (Fig. ). Thus, no update message within the same domain is sent to the A at a handove pocess. Fo the situation in Fig., in ode to maintain othe domains, we should define the contolle-to-contolle inteface. A contolle in a diffeent domain epots events though this inteface. The events may be simila to typical messages, but we leave this as a futhe study.. SP onfiguation At fist, multiple SPs between each AP and a BG ae povisioned statically. A netwok opeato ceates them based on netwok povisioning policies. We efe to this SP setup scheme as a static SP configuation scheme. The static SP configuation is good fo use with diffeentiated sevice models fo suppoting IP QoS sevices, and has been poposed by the IETF [9]. When one S in an ongoing MPS path has a poblem and cannot be used, the contolle detects an altenative path using its esouce table. Afte that, the contolle makes the coesponding Ss update each label table. We call this a dynamic SP configuation scheme. The dynamic SP configuation scheme is used to suppot the integated sevice model and to impove netwok eliability. In this pape, we conside that the static SP configuation is used fist, and the dynamic SP configuation can be used when a handove occus.. egistation Pocedue ) An M sends a egistation message afte it eceives agent advetisement messages boadcasted by an AP. ) The AP fowads the egistation message using the peestablished signaling SP between itself and a BG. ) When the BG eceives the egistation message, it updates its fowading table by associating the MN s IP addess with the inteface fom which the egistation message was eceived. If the wieless access MPS domain is not the MN s home domain, the BG sends a egistation message to the MN s A so that packets destined fo the MN can be tunneled fom the A to the FA. ) At the same time, each S coesponding to the SP infoms the contolle of its state with egad to the SP.. andove Pocedue Figue 5 shows the handove management pocedue in which is the cossove oute, and S I and S J ae the old FA and the new FA, espectively. outing table (state and esouce infomation each node) slave ontolle slave S I esouce state & statistics table (SP connection infomation) Fig. 5. The path e-establishing pocedue. slave S J If an M moves into the S J, and it sends a egistation equest message, then the S J infoms the contolle of the attachment of the M (step ). Immediately on eceiving the message, the contolle examines the esouce table about the SP (step ). Afte this pocess, it can detect an altenative path fom the outing table (step ). Afte choosing the altenative path with the link and node state, the contolle odes slave to modify the label table (step ). Figue 6 shows an update pocedue of the SP configuation efeence table in the contolle at handove time, whee it is assumed that is connected to S I with pot numbe, and S is connected with pot numbe 5. is also connected to S I with out label value 6 at pot numbe, and it is connected to S with out label value 8 at pot numbe 5. ETI Jounal, Volume 5, Numbe 5, Octobe Seong Gon hoi et al. 7

6 esv ID in Fig. 6 indicates the esouce state of the system. If the esv ID of S F in SP of the configuation efeence table is, S F is being used fo SP. If the esv ID is o any othe numbe, then the pot of the system may be eseved as one fo the SP. S F # : abel SP SP Table SPID Node S F S F Node S I 6 Node S I S M SP onfiguation efeence Table S esv ID In Pot Out Pot S F S I SP onfiguation efeence Table S esv ID In Pot Out Pot S F S 5 S J Node S J 8 Node5 In abel 6 In abel S... Out abel 6 Out abel 8 8 Fig. 6. Fowading table in the contolle. S J SP Figue 6 shows that an M is in the S I egion at fist and uses SP. If the M moves into S J fom S I, the M is seved by SP, so the contolle odes to change its out label value to 8 and its out pot numbe to 5 fo in label value. It also makes S establish out label value at the out pot numbe fo in label value 8. On the othe hand, packet loss duing handove should be taken into consideation. In geneal, thee ae some ideas, such as buffeing and fowading concepts, fo solving it in a packet netwok using signaling. The buffeing concept is that the cossove S stats to buffe data packets if it detects a handove using the o any othe method. Afte an M finishes the handove pocess, the cossove S sends the buffeed packets to the M in good ode. oweve, it is difficult to detemine the optimized buffe size. Especially in ealtime sevice, a delay poblem may esult fom the queuing delay accoding to the buffeing. The fowading concept is that an old S fist eceives data packets and then fowads them towad the new S. Fo this scheme, the contolle needs to establish a new SP between the old S and the new S. This scheme can also cause tansmission delay because the data packets go to the new S via the old S. Theefoe, in this pape, we conside a diect path change at a cossove S without buffeing data packets. Since all adjacent wieless cells by APs may be ovelapped fo a smooth handove and the contolle easily finds a cossove S ove the data path, a handove can be pefomed at the cossove S without packet loss if the ovelapped egion is well deployed. In othe wods, while an M esides in the ovelapped egion, a pope SP can be selected, and the handove can be pefomed in time. Fo this, seveal factos, such as packet tansmission delay, the M s moving speed, and the pocessing time of each device, should be consideed. We will continue to study this concept as a futhe study. IV. Analysis and Numeical esults In this section, we look into some chaacteistics of ou poposal, compae ou scheme with othe ones, and investigate the oveall pefomance in tems of signaling cost and latency time. We efe to [5] fo the analysis method hee. Ou scheme addesses a fast handove with a shot latency time. This scheme eliminates the signaling towad the emote A of an M as long as the M esides within the same administative domain. An attachment of an M towad a new S in the same administative domain ceates a egistation message only locally. We conside cost and delay fo signaling and packet delivey. In evaluating the latency time, tansmission delay and system time in databases ae consideed. The signaling pocedue of egistation and packet fowading by handove involves the exchange of egistation messages among the netwok elements. The costs fo location management ae associated with the taffic of messages between the entities and the accessing cost of the database. In ode to pesent and evaluate the pefomance of the signaling pocedue, we define the following paametes fo the est of the pape: c is the tansmission cost of messages between an S and a contolle. c is the tansmission cost of messages between an S and anothe S. c is the tansmission cost of messages between a contolle and anothe contolle. α is the weighting facto of the tansmission cost including layes and. β is the weighting facto of the access cost including laye. h is the numbe of total hops associated with the signaling o packet tansmission. a is the oute access cost including laye. 7 Seong Gon hoi et al. ETI Jounal, Volume 5, Numbe 5, Octobe

7 a is the database access cost of an A. a is database access cost of a contolle We also assume that the contolle and S ae modeled as a single exponential seve with an infinite buffe. A designated SP is established fo signaling between the contolle and each S. The aveage system time consists of the sevice time and the waiting time in the queue. It is epesented by s, s, and s. The s is the sevice time fo the pocessing database in the contolle, the s is the sevice time fo the laye pocess in the S accoding to the MPS, and the s is the sevice time fo the laye pocess in a oute in using a pue mobile IP. Each aveage sevice time is /µ, /µ, and /µ fo the contolle, oute, and S, espectively. The waiting times ae denoted by w, w, and w. The message tansmission delay is ignoed because the message length of signaling is vey shot, and the tansmission ate between the netwok elements is vey high. astly, it is assumed that the cost fo update and deletion in the database is the same, and fo simplicity, we deal with the pefomance only with the aveage values without delay jitte. Now we investigate the location egistation cost fo two diffeent cases. One is fo when the M pefoms a handove in the same domain, and the othe is fo when the M pefoms a handove between diffeent domains. When the M pefoms the handove in the same domain, we know that the signaling cost fo tansmission is αhc using the mobile IP fom Fig. 5. Using the, the cost is αhc. On the othe hand, we conside the access cost that involves the contolle and the S. The cost is β [(h ) a + a ] and β a c fo using the mobile IP and fo using the, espectively, whee ac indicates that the contolle efes to two databases, a outing table and a esouce state table, as shown in Fig. 5. The database access cost in using the is not dependent on a, because the signaling taffic is tansmitted at laye using the designated SP. The tansmission cost and access cost fo the handove between diffeent domains in a mobile IP ae equal to the cost fo the handove in the same domain. In using the, the tansmission cost is αhc + αhc. If we assume that the c is equal to the c, then the cost can be αhc. The access cost is βa fo contolle and contolle. onsequently, the aveage location egistation cost, (MIP) and (), can be calculated as: (MIP) = = αhc () = αhc + β a () = αhc + β a, + β[(h )a + a whee and indicate the cost fo handoves inside the ] () same domain and between the diffeent domains, espectively. Next, we investigate the cost fo signaling packet delivey. The packet delivey cost fo a mobile IP is obtained by d (MIP) = αhc + β[(h )a () = αhc + βa, d + a whee the packet delivey cost in using the is not dependent on a, because the packet is tansmitted via laye, and the cost fo laye is consideed with the tansmission cost. The delay of accessing each database, s( ), is ] () s( ) = / µ ( ) + w( ), () whee /µ( ) epesents the aveage pocessing time fo a database and w( ) denotes the waiting time fo the database. Fo example, if the aveage aival ate of location egistation at the contolle is η, then the waiting time is obtained as in [5], [6]. w η µ + η σ =, () η ( ) µ whee σ ( ) is the vaiance of the pocessing time in each database. Accodingly, the delay of the location egistation fo a handove in the same domain with the is a combination of the delay of accessing the S and the contolle. delay() = (h ) s + s µ + σ = (h ) µ + η η µ µ + σ + + η µ η µ whee the fist item is the sevice time of the S, and s indicates that the contolle accesses two databases within itself, the outing table and the esouce state table. Fo M handoves inside the same domain, the delay of location egistation is delay(mip) = (h )s + s When the M pefoms a handove between diffeent domains, the delay is (5) ETI Jounal, Volume 5, Numbe 5, Octobe Seong Gon hoi et al. 75

8 delay(mip) = (h )s delay() = (h )s + s + (s + s whee h indicates that thee ae at least Ss o outes, because an M moves into a diffeent domain. In addition, the s c and s c ae fo the system times fo contolle and contolle, espectively. Theefoe, the aveage delay fo location egistations D (MIP) and D () is D D D D (MIP) = (h )s (MIP) = (h )s () = (h )s () = (h )s + s + s, (h ) + s + s, (s = s = s ),,h ), whee D and D indicate handoves inside the same domain and between diffeent domains, espectively, and h indicates that thee ae at least Ss o outes, because the M moves into a diffeent domain. Fo signaling packet delivey, delay is simila to the case of (). D (MIP) = (h )s d + s D () = (h )s d + s Figue 7 shows the aveage location egistation cost as a function of the numbe of hops passed by a signaling message, whee ase indicates that the handove occus inside the same domain, and ase indicates that the handove occus between diffeent domains. The ase () line stats at numbe of the x axis because we assumed that an M moves into a diffeent domain. Table gives all the paametes used in ou pefomance analysis. Studying this table, we can see that the aveage location egistation cost of using a typical mobile IP inceases significantly. oweve, using the poposed method inceases the cost slightly with an incease in the numbe of hops. The initial cost of using the poposed method is lage than that of the typical mobile IP, because a contolle efes to two databases within itself, the outing table and the esouce state table. oweve, the lage the numbe of hops, the moe effective the poposed method. Figue 8 shows the aveage packet delivey cost fo signaling. In this figue, we can obseve that the aveage packet delivey cost of using the typical mobile IP is always equal to o lage than that of using the, except fo the initial point. At the initial point up to hops, the value fo using the is lage than that of using the Mobile IP, because a contolle efes to two databases within itself. Theefoe, as shown in Figs. 7 and 8, using the poposed method is moe pofitable than using the mobile IP if the. (6) (7) Table. Pefomance analysis paamete. Signaling tansmission cost Access cost Vaiance of DB pocessing time(ms) c c c a c a a σ Aveage pocessing time (ms) Avg. aival ate fo DB eg. (ms - ) Weighting facto /µ /µ /µ /µ η α β egistation cost Packet delivey cost ase (MIP) = ase (MIP) ase () ase () The numbe of hops fo egistation Fig. 7. Aveage location egistation cost. MIP The numbe of hops fo end-to-end packet delivey Fig. 8. Aveage packet delivey cost. numbe of hops fo egistation of the A is lage than when the M esides in the same domain. Figue 9 shows the aveage location egistation delay as a function of the numbe of hops passed by a signaling message, 76 Seong Gon hoi et al. ETI Jounal, Volume 5, Numbe 5, Octobe

9 whee the ase () line stats at numbe of the x axis because we assumed that an M moves into a diffeent domain. In this figue, although the aveage location egistation delay using the poposed method inceases slightly with the numbe of hops, the delay of using the typical mobile IP inceases significantly. While the initial value of the delay fo the poposed method is lage than that fo a mobile IP, it becomes lowe than that of the mobile IP when the numbe of hops inceases. Aveage delay fo egistation (ms) Aveage delay fo end-to-end packet delivey (ms) The numbe of hops fo egistation ase (MIP) = ase (MIP) ase () Fig. 9. Aveage location egistation delay. Fig.. Aveage packet delivey delay. ase () MIP The numbe of hops fo end-to-end packet delivey Figue shows the aveage packet delivey delay fo signaling. In this figue, we can see that the aveage delay of using the typical mobile IP is always equal to o lage than that of using the, except fo the initial point. At an initial point up to hops, the value fo using the is lage than that of using a mobile IP, because a contolle efes to two databases within itself. Theefoe, as shown in Figs. 9 and, using the poposed method is moe pofitable than using the mobile IP if the numbe of hops fo egistation of the A is lage than when the M esides in the same domain. V. onclusion and Futhe Study In this pape, we intoduced a hieachical achitectue fo suppoting mobility by using the on an MPS netwok. Since a contolle can manage its own domain as a centalized seve, the poposed method can diectly change the outing path at a cossove oute when a handove occus. Theefoe, in the poposed method, the fathe the distance between an FA and an A, the moe efficient the latency time and the egistation cost at the handove time. Fo using the poposed method efficiently, fist, the contolle-to-contolle should be studied moe. It can be efficient fo inte-domain handoves. Second, it would be advantageous to aange elations between the notification messages that ae sent to the contolle fom a salve (a new FA) and othe messages when an M pefoms a handove. Thid, the poposed netwok configuation still has the single point of failue although the poposed configuation can be moe eliable than pevious configuations using the gateway concept in a hieachical mobile stuctue. Thus, since the single point of failue is a vey impotant issue, we should conside the poblem as one of the most impotant fo futhe studies. efeences []. Pekins, IP Mobility Suppot, IETF F, Oct []. Pekins and D.B. Johnson, oute Optimization in Mobile IP, IETF Intenet daft, daft-ietf-mobileip-optim-.txt,. [] D.B. Johnson and. Pekins, Mobility Suppot in Ipv6, IETF Intenet daft, daft-ietf-mobileip-ipv6-.txt,. [] E. Gustafsson, A. Jonsson, and E.. Pekins, Mobile IP egional egistation, IETF Intenet daft, daft-ietf-mobileip-eg-tunnel-.txt, Ma.. [5]. amjee, T. a Pota, S. Thuel, K. Vaadhan, and S.Y. Wang, AWAII: A Domain-based Appoach fo Suppoting Mobility in Wide-Aea Wieless Netwoks, Poc. IEEE Int l onf. Netwok Potocols, 999. [6] A.T. ampbell et al., Design, Implementation and Evaluation of ellula IP, IEEE Pesonal ommunications, Aug., pp [7] Yile Guo, Z. Antoniou, and S. Dixit, IP Tanspot in G adio Access Netwoks: an MPS-Based Appoach, Poc. IEEE WN, Olando, Floida, Ma.. [8] Zhong en, hen-khong Tham, hun-hoong Foo, and hi- hung Ko, Integation of Mobile IP and Multi-Potocol abel Switching, Poc. IEEE I, elsinki, Finland, June. [9] eechang Kim, K.-S.D. Wong, Wai hen, and hi eung au, ETI Jounal, Volume 5, Numbe 5, Octobe Seong Gon hoi et al. 77

10 Mobility-Awae MPS in IP-Based Wieless Access Netwoks, Poc. IEEE Globecom, San Antonio, Texas, Nov.. [] F.A. hiussi, D.A. Khotimsky, and S. Kishnan, A Netwok Achitectue fo MPS-Based Mico-Mobility, Poc. IEEE WN, Olando, Floida, Ma.. [] Adian Fael, Paul Bitain, and Philip Matthews, Fault Toleance fo DP and -DP, daft-ietf-mpls-ldp-ft-.txt, May. [] Vishal Shama and Ben-Back ane, Famewok fo MPS-Based ecovey, IETF daft-ietf-mpls-ecovey-fmwk-.txt, Ma.. [] Avi Doia and Tom Woste, Geneal Switch Management Potocol daft-ietf-gsmp-8. txt, available at html.chates/gsmp-chate.html, Nov.. [] Buce Davie and Yakov ekhte, MPS Technology and Applications, Mogan Kaufmann Publishes,. [5] Wenye Wang and Ian F. Akyildiz, A ost-efficient Signaling Potocol fo Mobility Application Pat (MAP) in IMT- Systems, AM SIGMOBIE, ome, Italy,. [6]. Kleinock, Queueing Systmes Volume : TEOY, John Wiley & Sons, 975. Seong Gon hoi eceived his BS degee in electonics fom Kyung Pook National Univesity in 99 and MS degee fom Infomation and ommunications Univesity (IU) in 999. e woked fo G Infomation and ommunications duing e is cuently taking a doctoal couse in IU in Daejeon, Koea. is eseach inteests include mobility, high-speed netwok achitectue, and potocol. yun Joo Kang eceived the MS degee in netwoks fom Infomation ommunications Univesity (IU) in Koea in. She joined the Netwok eseach aboatoy at the Electonic and Telecommunicatins eseach Institute (ETI) in Daejeon, Koea, whee she has done session initiation potocol (SIP) poxy of VoIP. She is cuently studying DTV steaming technology and sevice level ageement in diff-sev netwoks. Jun Kyun hoi eceived his BS degee in electonics fom Seoul National Univesity in 98 and MS and PhD degees fom KAIST in 985 and 988. e woked fo ETI duing e is cuently woking as an Associate Pofesso in Infomation and ommunications Univesity in Daejeon, Koea. is eseach inteests include high-speed netwok achitectue and potocol. 78 Seong Gon hoi et al. ETI Jounal, Volume 5, Numbe 5, Octobe

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

EE 6900: Interconnection Networks for HPC Systems Fall 2016

EE 6900: Interconnection Networks for HPC Systems Fall 2016 EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New

More information

Configuring RSVP-ATM QoS Interworking

Configuring RSVP-ATM QoS Interworking Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs Fault-Toleant Routing Schemes in RDT(,,)/α-Based Inteconnection Netwok fo Netwoks-on-Chip Designs Mei Yang, Tao Li, Yingtao Jiang, and Yulu Yang Dept. of Electical & Compute Engineeing Univesity of Nevada,

More information

Method of controlling access to intellectual switching nodes of telecommunication networks and systems

Method of controlling access to intellectual switching nodes of telecommunication networks and systems ISSN (e): 2250 3005 Volume 05 Issue 05 ay 2015 Intenational Jounal of Computational Engineeing eseach (IJCE) ethod of contolling access to intellectual switching nodes of telecommunication netwoks and

More information

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

Adaptation of TDMA Parameters Based on Network Conditions

Adaptation of TDMA Parameters Based on Network Conditions Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300

More information

The Dual Round Robin Matching Switch with Exhaustive Service

The Dual Round Robin Matching Switch with Exhaustive Service The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line

More information

Modeling a shared medium access node with QoS distinction

Modeling a shared medium access node with QoS distinction Modeling a shaed medium access node with QoS distinction Matthias Gies, Jonas Geutet Compute Engineeing and Netwoks Laboatoy (TIK) Swiss Fedeal Institute of Technology Züich CH-8092 Züich, Switzeland email:

More information

Dynamic Topology Control to Reduce Interference in MANETs

Dynamic Topology Control to Reduce Interference in MANETs Dynamic Topology Contol to Reduce Intefeence in MANETs Hwee Xian TAN 1,2 and Winston K. G. SEAH 2,1 {stuhxt, winston}@i2.a-sta.edu.sg 1 Depatment of Compute Science, School of Computing, National Univesity

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver 1 RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Dive Amit Jain Daji Qiao Kang G. Shin The Univesity of Michigan Ann Abo, MI 4819, USA {amitj,dqiao,kgshin@eecs.umich.edu Abstact The cuent

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks Numbe of Paths and Neighbous Effect on Multipath Routing in Mobile Ad Hoc Netwoks Oday Jeew School of Infomation Systems and Accounting Univesity of Canbea Canbea ACT 2617, Austalia oday.jeew@canbea.edu.au

More information

A Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks

A Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks A Coss-Laye Famewok of QoS Routing and Distibuted Scheduling fo Mesh Netwoks Chi Haold Liu, Athanasios Gkelias, and Kin K. Leung Depatment of Electical and Electonic Engineeing, Impeial College London

More information

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints Tie-Based Undewate Acoustic Routing fo Applications with Reliability and Delay Constaints Li-Chung Kuo Depatment of Electical Engineeing State Univesity of New Yok at Buffalo Buffalo, New Yok 14260 Email:

More information

Time-Constrained Big Data Transfer for SDN-Enabled Smart City

Time-Constrained Big Data Transfer for SDN-Enabled Smart City Emeging Tends, Issues, and Challenges in Big Data and Its Implementation towad Futue Smat Cities Time-Constained Big Data Tansfe fo SDN-Enabled Smat City Yuanguo Bi, Chuan Lin, Haibo Zhou, Peng Yang, Xuemin

More information

On using circuit-switched networks for file transfers

On using circuit-switched networks for file transfers On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed

More information

Analysis of Wired Short Cuts in Wireless Sensor Networks

Analysis of Wired Short Cuts in Wireless Sensor Networks Analysis of Wied Shot Cuts in Wieless Senso Netwos ohan Chitaduga Depatment of Electical Engineeing, Univesity of Southen Califonia, Los Angeles 90089, USA Email: chitadu@usc.edu Ahmed Helmy Depatment

More information

MAC Protocol for Supporting QoS in All-IP HiperLAN2

MAC Protocol for Supporting QoS in All-IP HiperLAN2 MAC Potocol fo Suppoting QoS in All-IP HipeLAN Chistos E. Politis, Rahim Tafazolli Univesity of Suey Cente fo Communication Systems Reseach Guildfod, GU 7XH, Suey, UK Tel.: +44 483 683463, FAX: +44 483

More information

Quality Aware Privacy Protection for Location-based Services

Quality Aware Privacy Protection for Location-based Services In Poceedings of the th Intenational Confeence on Database Systems fo Advanced Applications (DASFAA 007), Bangkok, Thailand, Apil 9-, 007. Quality Awae Pivacy Potection fo Location-based Sevices Zhen Xiao,,

More information

The concept of PARPS - Packet And Resource Plan Scheduling

The concept of PARPS - Packet And Resource Plan Scheduling The concept of PARPS - Packet And Resouce Plan Scheduling Magnus Eiksson 1 and Håkan Sätebeg 2 1) Dept. of Signals, Sensos and Systems, Royal Inst. of Technology, Sweden. E-mail: magnus.eiksson@ite.mh.se.

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

An effective hop-by-hop Interest shaping mechanism for CCN communications

An effective hop-by-hop Interest shaping mechanism for CCN communications An effective hop-by-hop Inteest shaping mechanism fo CCN communications Natalya Rozhnova, Sege Fdida To cite this vesion: Natalya Rozhnova, Sege Fdida. An effective hop-by-hop Inteest shaping mechanism

More information

Efficient protection of many-to-one. communications

Efficient protection of many-to-one. communications Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

Signal integrity analysis and physically based circuit extraction of a mounted

Signal integrity analysis and physically based circuit extraction of a mounted emc design & softwae Signal integity analysis and physically based cicuit extaction of a mounted SMA connecto A poposed geneal appoach is given fo the definition of an equivalent cicuit with SMAs mounted

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Erasure-Coding Based Routing for Opportunistic Networks

Erasure-Coding Based Routing for Opportunistic Networks Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant

More information

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks 788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

Event-based Location Dependent Data Services in Mobile WSNs

Event-based Location Dependent Data Services in Mobile WSNs Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,

More information

AMERICAN UNIVERSITY OF BEIRUT IMPROVING DATA COMMUNICATIONS IN VEHICULAR AD HOC NETWORKS VIA COGNITIVE NETWORKS TECHNIQUES ALI JAWAD GHANDOUR

AMERICAN UNIVERSITY OF BEIRUT IMPROVING DATA COMMUNICATIONS IN VEHICULAR AD HOC NETWORKS VIA COGNITIVE NETWORKS TECHNIQUES ALI JAWAD GHANDOUR AMERICAN UNIVERSITY OF BEIRUT IMPROVING DATA COMMUNICATIONS IN VEHICULAR AD HOC NETWORKS VIA COGNITIVE NETWORKS TECHNIQUES by ALI JAWAD GHANDOUR A thesis submitted in patial fulfillment of the equiements

More information

Pipes, connections, channels and multiplexors

Pipes, connections, channels and multiplexors Pipes, connections, channels and multiplexos Fancisco J. Ballesteos ABSTRACT Channels in the style of CSP ae a poeful abstaction. The ae close to pipes and connections used to inteconnect system and netok

More information

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers XFVHDL: A Tool fo the Synthesis of Fuzzy Logic Contolles E. Lago, C. J. Jiménez, D. R. López, S. Sánchez-Solano and A. Baiga Instituto de Micoelectónica de Sevilla. Cento Nacional de Micoelectónica, Edificio

More information

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing IEEE TRANSACTIONS ON COMPUTERS, VOL. 50, NO. 9, SEPTEMBER 200 949 Dynamic Multiple Paity (DMP) Disk Aay fo Seial Tansaction Pocessing K.H. Yeung, Membe, IEEE, and T.S. Yum, Senio Membe, IEEE AbstactÐThe

More information

On the throughput-cost tradeoff of multi-tiered optical network architectures

On the throughput-cost tradeoff of multi-tiered optical network architectures 1 On the thoughput-cost tadeoff of multi-tieed optical netwok achitectues Guy Weichenbeg, Vincent W. S. Chan, and Muiel Médad Laboatoy fo Infomation and Decision Systems Massachusetts Institute of Technology

More information

TCBAC: An Access Control Model for Remote Calibration System

TCBAC: An Access Control Model for Remote Calibration System JOURNAL OF SOFTWARE, VOL. 8, NO., DECEMBER 03 339 TCBAC: An Access Contol Model fo Remote Calibation System Zhuokui Wu School of Mechanical & Automotive Engineeing, South China Univesity of Technology,

More information

Embeddings into Crossed Cubes

Embeddings into Crossed Cubes Embeddings into Cossed Cubes Emad Abuelub *, Membe, IAENG Abstact- The hypecube paallel achitectue is one of the most popula inteconnection netwoks due to many of its attactive popeties and its suitability

More information

Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks

Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks Available online at www.sciencediect.com Ad Hoc Netwoks 7 (29) 23 247 www.elsevie.com/locate/adhoc Minimizing spatial and time esevation with Collision-Awae DCF in mobile ad hoc netwoks Lubo Song a, Chansu

More information

IS-IS Protocol Hardware Implementation for VPN Solutions

IS-IS Protocol Hardware Implementation for VPN Solutions IS-IS Potocol Hadwae Implementation fo VPN Solutions MOHAMED ABOU-GABAL, RAYMOND PETERKIN, DAN IONESCU School of Infomation Technology and Engineeing (SITE) Univesity of Ottawa 161 Louis Pasteu, P.O. Box

More information

Advances in Automobile Engineering

Advances in Automobile Engineering nadvances in Automobile E gineeing ISSN: 2167-7670 Advances in Automobile Engineeing Kabi, 2012, 1:3 DOI: 10.4172/2167-7670.1000101 Reseach Aticle Open Access Netwok Achitectue of a Moden Automotive Infotainment

More information

Automatic Generation of Reliable E Commerce Payment Processes

Automatic Generation of Reliable E Commerce Payment Processes Infomation Systems Engineeing (WISE 2000), Hong Kong, China, June 2000. Automatic Geneation of Reliable E Commece Payment Pocesses Heiko Schuldt Andei Popovici Hans-Jög Schek Institute of Infomation Systems

More information

Gravitational Shift for Beginners

Gravitational Shift for Beginners Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational

More information

High performance CUDA based CNN image processor

High performance CUDA based CNN image processor High pefomance UDA based NN image pocesso GEORGE VALENTIN STOIA, RADU DOGARU, ELENA RISTINA STOIA Depatment of Applied Electonics and Infomation Engineeing Univesity Politehnica of Buchaest -3, Iuliu Maniu

More information

Exploring non-typical memcache architectures for decreased latency and distributed network usage.

Exploring non-typical memcache architectures for decreased latency and distributed network usage. Syacuse Univesity SURFACE Electical Engineeing and Compute Science Technical Repots College of Engineeing and Compute Science 9-5-20 Exploing non-typical memcache achitectues fo deceased latency and distibuted

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

On Adaptive Bandwidth Sharing with Rate Guarantees

On Adaptive Bandwidth Sharing with Rate Guarantees On Adaptive Bandwidth Shaing with Rate Guaantees N.G. Duffield y T. V. Lakshman D. Stiliadis y AT&T Laboatoies Bell Labs Rm A175, 180 Pak Avenue Lucent Technologies Floham Pak, 101 Cawfods Cone Road NJ

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

ANN Models for Coplanar Strip Line Analysis and Synthesis

ANN Models for Coplanar Strip Line Analysis and Synthesis 200 IJCSNS Intenational Jounal of Compute Science and Netwok Secuity, VOL.8 No.10, Octobe 2008 Models fo Coplana Stip Line Analysis and J.Lakshmi Naayana D.K.Si Rama Kishna D.L.Patap Reddy Chalapathi Institute

More information

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE 1 YAROSLAVTSEV A.F., 2 Al-THUNEIBAT S.A., 3 AL TAWALBEH N.A 1 Depatment of Netwoking, SSUTI, Novosibisk, Russia

More information

Wormhole Detection and Prevention in MANETs

Wormhole Detection and Prevention in MANETs Womhole Detection and Pevention in MANETs Lija Joy Compute Science and Engineeing KMEA Engineeing College Enakulum, Keala, India lijavj@gmail.com Sheena Kuian K Compute Science and Engineeing KMEA Engineeing

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation A Minutiae-based Fingepint Matching Algoithm Using Phase Coelation Autho Chen, Weiping, Gao, Yongsheng Published 2007 Confeence Title Digital Image Computing: Techniques and Applications DOI https://doi.og/10.1109/dicta.2007.4426801

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE 5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

MULTI-AGENT SYSTEM FOR NETWORK ATTACK DETECTION

MULTI-AGENT SYSTEM FOR NETWORK ATTACK DETECTION Intenational Jounal of Civil Engineeing and Technology (IJCIET) Volume 9, Issue 6, June 2018, pp. 279 286, Aticle ID: IJCIET_09_06_032 Available online at http://www.iaeme.com/ijciet/issues.asp?jtype=ijciet&vtype=9&itype=6

More information

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad

More information

Hierarchical Peer-to-peer Systems

Hierarchical Peer-to-peer Systems Hieachical Pee-to-pee ystems L. Gacés-Eice 1, E.W. Biesack 1, P.A. Felbe 1, K.W. Ross 2, and G. Uvoy-Kelle 1 1 Institut EURECOM 06904 ophia Antipolis, Fance {gaces ebi felbe uvoy}@euecom.f 2 Polytechnic

More information

Separability and Topology Control of Quasi Unit Disk Graphs

Separability and Topology Control of Quasi Unit Disk Graphs Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,

More information

A ROI Focusing Mechanism for Digital Cameras

A ROI Focusing Mechanism for Digital Cameras A ROI Focusing Mechanism fo Digital Cameas Chu-Hui Lee, Meng-Feng Lin, Chun-Ming Huang, and Chun-Wei Hsu Abstact With the development and application of digital technologies, the digital camea is moe popula

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapte 4 Netwok Laye Reti di Elaboatoi Coso di Lauea in Infomatica Univesità degli Studi di Roma La Sapienza Canale A-L Pof.ssa Chiaa Petioli Pate di queste slide sono state pese dal mateiale associato

More information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information Title CALCULATION FORMULA FOR A MAXIMUM BENDING MOMENT AND THE TRIANGULAR SLAB WITH CONSIDERING EFFECT OF SUPPO UNIFORM LOAD Autho(s)NOMURA, K.; MOROOKA, S. Issue Date 2013-09-11 Doc URL http://hdl.handle.net/2115/54220

More information

Toward the road to NGI: IPv6 multicast operation of IPv6-CJ backbone

Toward the road to NGI: IPv6 multicast operation of IPv6-CJ backbone Towad the oad to NGI: IPv6 multicast opeation of IPv6-CJ backbone Li Zimu, Wang Jilong, Li Xing, Wu Jianping, An Changqing China Education and eseach Netwok (CENET) Cente Tsinghua Univesity, Beijing PC

More information

Interference-Aware Multicast for Wireless Multihop Networks

Interference-Aware Multicast for Wireless Multihop Networks Intefeence-Awae Multicast fo Wieless Multihop Netwoks Daniel Letpatchya School of Electical and Compute Engineeing Geogia Institute of Technology Atlanta, Geogia 30332 0250 Douglas M. Blough School of

More information

TCP Libra: Exploring RTT-Fairness for TCP

TCP Libra: Exploring RTT-Fairness for TCP TCP Liba: Exploing RTT-Fainess fo TCP UCLA Compute Science Depatment Technical Repot #TR050037 Gustavo Mafia, Claudio Palazzi, Giovanni Pau, Maio Gela, M. Y. Sanadidi, Maco Roccetti, Compute Science Depatment

More information