Location Database Clustering to Achieve Location Management Time Cost Reduction in A Mobile Computing System

Size: px
Start display at page:

Download "Location Database Clustering to Achieve Location Management Time Cost Reduction in A Mobile Computing System"

Transcription

1 Location Database Clustering to Achieve Location Management Time Cost Reduction in A Mobile Computing ystem Chen Jixiong, Li Guohui, Xu Huajie, Cai Xia*, Yang Bing chool of Computer cience & Technology, Huazhong University of cience & Technology Department of Computer cience, Huazhong Normal University* Wuhan, P.R.China, Abstract-An important issue in the design of a mobile computing system is how to manage the location information of mobile clients. In the existing commercial cellular mobile computing systems, a two-tier architecture is adopted. However, the two-tier architecture is not scalable. In the literatures, a hierarchical database structure is proposed in which the location information of mobile clients within a cell is managed by the location database responsible for the cell. The location databases of different cells are organized into a tree-like structure to facilitate the search of mobile clients. This architecture can distribute the workload amongst the location databases in the system. The location database organization has much impact on the total location management cost. However, non of previous work touches upon this problem. In this paper, considering the mobility patterns of mobile clients in different cells, we give a heuristic algorithm to cluster the location databases with the objective to reduce the location management cost. Extensive experiments are designed to evaluate the performance. The comparison shows that our location database clustering method can result in location update cost reduction. Index Terms- Mobile computing system, location management time cost, location database, location database clustering, set cover I. INTRODUCTION One of the most important issues in the design of the mobile computing systems is the location management of mobile clients [1, 2, 3, 4]. This is not only essential for providing efficient mobile communication services among mobile clients but also important to many new mobile computing applications, such as systems to support location dependent queries [5]. In the existing cellular mobile networks, a two-tier location database architecture is adopted to manage the locations of mobile clients [6]. This two-tier architecture is simple and easy to implement. However, it has two serious performance problems, which makes it unsuitable for many new mobile computing applications. Firstly, the number of mobile clients in a mobile computing system can be very large, and the system may need to maintain a large amount of location information for its mobile clients. It is obvious that the two-tier architecture is not scalable. econdly, because a mobile client is permanently associated with a Home Location Register (HLR), the overheads for maintaining the locations of mobile clients can be very heavy if the mobility of clients is high. It is obvious that the cost for locating a mobile client greatly depends on the locations of the calling mobile client and the called mobile client. If a called mobile client is far away from its HLR, the cost for locating the mobile client could be very expensive. In order to improve the system performance and to reduce the total cost for locating a mobile client, various strategies have been proposed. One of the efficient methods is to organize the location databases in a hierarchical structure [1, 7]. Although the hierarchical structure of the location databases can improve the performance of searching for mobile clients, the total location update overheads for maintaining the locations of mobile clients can also be heavy. In the organization of the hierarchical databases, it is important to consider the update cost as well as the movements of mobile clients, i.e., the mobility patterns. ince in the system, different mobile clients can have very different mobility patterns, the location database organization has much impact on the location management cost. However, to our best knowledge, it still lacks any detailed study on the relationship between the location database organization and the location management cost. In this paper, we study the location database (LDB) organization problem in hierarchical databases for mobile computing systems over cellular networks. Our objective is to design a nearly-ideal location database topology structure to achieve the location management cost reduction. It is NP-hard to design an ideal LDB topology structure. In this paper, we give a heuristic algorithm to design a nearly ideal topology structure for the LDB organization based on the set covering theory. The remaining parts of this paper are organized as follows. ection II defines the system model. ection III proposes the basic definitions applied in the paper. ection IV presents a heuristic LDB organization method based on the set covering theory. ection V includes the performance evaluation of the algorithm and section VI is the conclusion. II. CELLUAR MOBILE NETWORK AND LOCATION DATABAE MODEL X/05/$ IEEE 1328

2 A cellular mobile network is based on the concept of frequency reuse. The whole service area is divided into a number of connected cells with a base supporting station (B) in each cell. The limited wireless bandwidth is partitioned into channels. The mobile clients within a cell communicate with the B of the cell through a wireless channel. Each B maintains a location database. The location databases of different neighboring B s are organized into a hierarchical tree structure, as shown in Figure 1. Note that in an existing GM mobile network, the location databases are managed by mobile switching centers. There are a large number of mobile clients in the system. They may make a call or submit a query on the locations of other mobile clients. It is assumed that different mobile clients can have different mobility patterns. Cell 1 Cell 2 Cell 3 Cell 4 Cell 5 Cell 6 Cell 7 Cell 8 Cell 9 Figure 1. Hierarchical databases to store the mobile clients locations III. PRINCIPLE AND DEFINITION A. Terminology ince the location databases are organized into a tree like structure, we define the least common ancestor of (leaf) location databases DB i and DB j as LCA(DB i, DB j ). The height of LCA(DB i, DB j ) to the leaf nodes of the tree is denoted as lca(db i, DB j ). (We assume that all of the leaf nodes of the location databases are at the same level in the hierarchical location database tree). Let the leaf location database responsible for the cell i be LDB(i). Definition 1: The distance between cells i and j, termed as dis(i, j), is defined as the height of the least common ancestor of the responsible leaf the location databases, that is dis(i,j) = lca(ldb(i),ldb(j)) If i = j then dis(i, j) = 0. Let cur_cell(x) be the cell in which mobile client x is now residing. Definition 2: The distance between mobile clients x and y, termed dis(x, y), is defined as the distance of the two cells in which x and y is now residing, namely dis(x, y) = dis(cur_cell(x), cur_cell(y)). The above definition captures the locality of two mobile clients. It can be seen easily that a mobile client takes a smaller cost to find the location information of another mobile client if the distance between them is smaller[1]. When calculating the location management cost, as in [1,2], we consider the following related time costs in location update and the lookup procedure: t L : The time cost of following a link in the tree of the location databases, i.e., sending a message to the parent or the child node of a location database; t U : The time cost of a database update; t Q : The time cost of a database query; B. Problem When a mobile client crosses the boundary between two cells and moves from its formerly residing cell, old_cell(x),into the currently residing cell, cur_cell(x), the total location update cost is: Update_cost=2dis(old_cell(x), cur_cell(x)) t L + (2dis(old_cell(x), cur_cell(x))+1) t U eqn. (1) As can be seen from the above equation, the location update time cost is proportional to the distance between the starting and destination cells of a mobile client. However, the distance between two cells in a location database hierarchical tree is not necessarily the same under different LDB topological structure. The hierarchical structure of the location databases can have a significant impact on the location management cost. Before constructing the location database tree, we should consider the mobility patterns of all the mobile clients to optimize the total location management cost. Cell 1 Cell 5 Cell 8 Cell 2 Cell 4 Cell 6 Cell 3 Cell 7 Cell 9 Figure 2. A mobile computing system consisting of 9 cells Let us consider a more detailed example to illustrate the problem. uppose in the systems, there are 9 cells as in Figure 2 and the 9 location databases responsible for the 9 cells are organized as in Figure 1. During a time period, there are 200 times of border-crossings between Cell 3 and Cell 4, and 50 times of border-crossings between Cell 2 and Cell 3. According to Equation (1), the total time cost to update the 200 times of border-crossings between the Cell 3 and Cell 4 is: 200 (2 dis t L + 2 dis t U + t U ) = 200 (2 2 t L t U + t U ) = 800t L t U where dis is the distance (see Definition 1) between the two leaf location databases responsible for Cell 3 and Cell 4, namely 2. The location update time cost to update the 50 times of X/05/$ IEEE 1329

3 border-crossings between Cell 2 and Cell 3 is: 100t L +150t U Therefore, the total location update time cost is 900t L +1150t U. If we reorganize the location databases by switching the positions of DB5 and DB7 with each other in the hierarchical tree, the total time cost to update the 200 times of border-crossings between Cell 3 and Cell 4 becomes: 200 (2 dis t L + 2 dis t U + t U ) = 200 (2 1 t L t U + t U ) = 400t L + 600t U The total time cost to update the 50 times of border-crossings between Cell 2 and Cell3 becomes: 50 (2 dis t L + 2 dis t U + t U ) = 50 (2 2 t L t U + t U ) = 200t L + 250t U The total location update time cost in the reorganized case will be 600t L +850t U and the location update time saving is 300t L +300t U. o the LDB topology structure has a great impact on the location management cost. IV. LOCATION DATABAE ORAGINZATION Before the LDB organization, we construct a mobility matrix, M, in which M ij is the number of boundary crossings between the cell i and cell j during a time period. Table 1 is an example mobility matrix. TABLE I AN EXAMPLE OF MOBILITY MATRIX C1 C2 C3 C4 C5 C6 C7 C8 C9 C C C C C C C C C In the following sections, we give a set-covering algorithm to organize the location databases with the objective to minimize the total location management time cost. Definition 3 A set of sets 1, 2,, n is called a cover of a set if and only if = n i=1 i Definition 4 A set of sets 1, 2,, n is called a non-overlapping cover of a set if and only if (1) n = i i=1 (2) i, j,1 i, j n, i j, i j = φ In general, a (non-overlapping) cover of a set is associated with a cost and we try to find an algorithm to get a cover of a set with the minimum cost. Actually, to find a (non-overlapping) cover of a set with the optimal cost is NP-hard [8]. Under different circumstances, heuristic algorithms are given to get the nearly ideal result. In the following, the problem of location database structuring is transformed to the problem of getting a non-overlapping cover of the set of location databases (the associated cost is explained later) where (1) et is the set of leaf location databases in the system; (2) The objective function is the total location update time cost in the given location database topological structure. To get a location database organization with a nearly ideal location update time cost, a set of sets is constructed as follows: (1) For i, 1 i n, i =Cell i (2) For each Cell j, if the number of border-crossings between Cell i and Cell j (denoted as M ij ) is larger than 0, then i = i Cell j Obviously, 1, 2,, n is a cover (with overlapping) of the set =Cell 1, Cell 2,., Cell n. Here n is the total number of cells in the system. Based on this cover of, we get a non-overlapping cover of. Note that here the cost with the set covering of the n leaf location databases corresponding to the n cells in the systems is the total number of boundary crossing between two cells in two different sets. That is num-crossing= M p q p q Cell i Cell j p ij,,, q p and q are two different set in a covering of Where the set of the n cells. After the construction of the above objective function, we give a heuristic algorithm to get a nearly-ideal covering of the set of n cells ( leaf location databases corresponding to the n cells) with the objective to get the minimal value of num-crossing. Then each component (a leaf location database set which is composed of d(explained later) location databases) of the cover forms a cluster. The following is the procedure to get the non-overlapping cover. In the following section, the number of elements in a set is denoted as. d is the number of sub-location databases in the hierarchical tree. In figure1, d is 3. PROCEDURE LDB-structuring INPUT: M ij, 1, 2,., n OUTPUT: A topology structure for the location database tree =1; REPEAT UNTIL i i = φ X/05/$ IEEE 1330

4 (1) uppose that the M ij is maximal value in the set M ab r,s, 1 r,s n, (Cell a r Cell b s ) (2) =Cell i, Cell j (3) Delete Cell i/cell j from any k (1 k n) which includes Cell i/cell j (4) WHILE <d DO 1 Compose the temporary set T as follows:t=φ; 2 For Cell p in the system If ( k, 1 k n (Cell p k )) (Cell p ) ( Cell q (M pq >0)) T= T Cell p IF T φ 3 For Cell m in T, according to the following equation, calculate total-num m where total-num m = Mim Cell i i 4 elect the Cell x from T with the maximal value of total-num m defined as above. ELE elect a Cell x randomly from any i (1 i n) 5 = Cell x 6 For all the set i, (1 i n) i = i -Cell x =+1; After the above procedure terminates, the leaf location databases corresponding to the sets (=1,2,..., n/d) forms a cluster. The clusters of the leaf location databases are organized recursively in the same way to achieve the total location update time cost reduction. Due to the limitation of space, the detailed procedure is omitted. V. IMULATION PERFORMANCE EVALUATION As can be seen from the construction of the covering of the n location databases, for the location databases between which there are a larger number of boundary-crossings, they are clustered to reduce the distance between the location databases. This can obviously result in the location update cost reduction. To see to what extent the algorithm can reduce the location update cost, first we give an algorithm under which the location databases are connected with their randomly chosen neighboring location databases (We call this method Randomly Clustering: RC). Then we design simulation experiments and compare the performance of the algorithm with that of the algorithm proposed in this paper (Clustering based on et Covering: CC). In the simulation experiment, there are 6561(=38) cells (corresponding to 6561 leaf location databases) in the system and all the location databases are organized into a hierarchical tree. There are 100,000 mobile clients scattering in the 6561 cells randomly. In the location database tree, each inner location database has 3 sub-location databases and the depth of the location database tree is 8. In other words, the maximal distance between any two leaf location databases is 8. The number of boundary-crossings per time unit for all the mobile clients follow a normal distribution. We argue that even if in a real application, the number of boundary-crossings for mobile clients may not follow a normal distribution, these experiments can show that we can achieve the total location management cost reduction by structuring the location databases deliberately. As can be seen from Equation (1), the location update cost is proportional to the distance between two leaf location databases responsible for the corresponding two cells. In the experiments, when comparing the location update costs, we only need to count the total distance for all the boundary-crossings. The following table describes the key parameters in the experiments. TABLE II THE KEY PARAMETER IN THE EXPERIMENT The parameters The value Number of cells 6561 Number of sub-ldb for an inner LDB 3 Depth of the LDB hierarchical tree 8 Number of mobile clients 100,000 We design two sets of experiments. In one set of experiments, we assign a static number (=4) to the mean value (for the normal distribution) of the number of boundary-crossings (NBC) per time unit for a mobile client and change the deviation (for the normal distribution) of the number of boundary-crossings. Then we compare the location update cost per time unit in the two location database tree organization method: RC and CC. The performance comparison is shown in Figure 3. Location update cost per time unit The deviation of the NBC Figure 3. Location update comparison(nbc=4) RC CC X/05/$ IEEE 1331

5 As can be seen from Figure 3, when the deviation of the NBC becomes larger, this means that there is more difference in the actual number of boundary-crossings per time unit for different mobile clients. In other words, there is more difference in the mobility patterns for different mobile clients. By using the CRC method, we can achieve a significant location update cost reduction. Contrary to the RC method in which the total location update cost remains almost the same, in the CRC case, the total location update cost decreases gradually. This is because even though the total number of boundary-crossings remains stable (because the mean value of NBC remains the same), the distances for the frequent boundary-crossings are reduced by using CRC method. Thus this results in total location update cost reduction. In the other set of experiments, we change the mean value of the NBC for a mobile client and the deviation of the NBC is set as half of the mean value. The performance comparison is shown in Figure 4. In both cases, we can see that with the increase of mean value of NBC, the total location update cost increases. But the location update cost increases more slowly in CRC method than that RC method. Furthermore, location management cost in the CRC method is much less than that in the RC method. This is because that with the increase of the NBC mean value, the NBC deviation also increases (it is half of the NBC mean value) which means greater different among the mobility patterns for mobile clients. This gives more space for the CRC method to organize the location databases which means more location update cost reduction. The more location update cost reduction is reflected as more difference in location update cost between the RC method and CRC method in Figure 4. Location update cost time unit The Mean Value of NBC RC CC patterns of the mobile clients. This paper focuses on this problem with the objective to achieve the location management cost reduction. Actually, when organizing the location databases, we should not only consider the number of boundary-crossings between different cells but also the number of calls between them. Furthermore, a mobile client can change its mobility pattern after the location database tree has been constructed. o the performance of an ideal location database topological structure can deteriorate with the time. A location database re-organization procedure is needed to accommodate the mobility pattern variation. We are currently concentrating on these research topics to achieve a better location management performance. REFERENCE [1] Evaggelia Pitoura and George amaras, Locating Objects in Mobile Computing, IEEE Transactions on Knowledge and Data Engineering, VOL. 13, NO.4, 2001 [2] ajak K. Das and anjoy K. en, Adaptive Location Prediction trategies Based On a Hierarchical Network Model in a Cellular Mobile Environment, The Computer Journal, vol. 42, no.6, [3] Xie, H., Tabbane,. and Goodman, D., Dynamic Location Area Management and Performance analysis, in Proceeding of 43rd IEEE Vehicular Technology Conference, May [4] Plassmann, D., Location Management trategies for Mobile Cellular Networks of 3rd Generation, in Proceedings of 44th IEEE Vehicular Technology Conf., June [5] Hüseyin Gökmen Gök and Özgür Ulusoy, Transmission of Continuous Query Results in Mobile Computing ystems, Information ciences, vol. 125, no. 1-4, pages 37-63, [6] M. Mouly and M.B. Pautet, The GM ystem for Mobile Communication, Cell and ys, [7] E. Pitoura and I. Fudos, An Efficient Hierarchical cheme for Locating Highly Mobile Users, in Proceedings of the 6th ACM International Conference on Information and Knowledge Management (CIKM98), November 1998, pp [8] V. Chvatal, A greedy heuristic for the set-covering problem, Mathematics. Operations. Research (1975) Figure 4. Location update cost comparison (Variable Mean Value) VI. CONCLUION Maintaining the real-time locations of mobile clients is essential to many new mobile computing systems. The traditional two-tier location database architecture is not scalable and unsuitable for the new applications in which there are a very large number of mobile clients. A hierarchical location database architecture is proposed to distribute the location update and search workload among different location databases. However, if the location databases are not properly organized, the total location management cost can be very high. When organizing the location databases, we should take into account the mobility X/05/$ IEEE 1332

Clustering-Based Distributed Precomputation for Quality-of-Service Routing*

Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Yong Cui and Jianping Wu Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 cy@csnet1.cs.tsinghua.edu.cn,

More information

PERSONAL communications service (PCS) provides

PERSONAL communications service (PCS) provides 646 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 5, NO. 5, OCTOBER 1997 Dynamic Hierarchical Database Architecture for Location Management in PCS Networks Joseph S. M. Ho, Member, IEEE, and Ian F. Akyildiz,

More information

Spatial and Temporal Aware, Trajectory Mobility Profile Based Location Management for Mobile Computing

Spatial and Temporal Aware, Trajectory Mobility Profile Based Location Management for Mobile Computing Spatial and Temporal Aware, Trajectory Mobility Profile Based Location Management for Mobile Computing Jianting Zhang Le Gruenwald The University of Oklahoma, School of Computer Science, Norman, OK, 73019

More information

Improving Suffix Tree Clustering Algorithm for Web Documents

Improving Suffix Tree Clustering Algorithm for Web Documents International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2015) Improving Suffix Tree Clustering Algorithm for Web Documents Yan Zhuang Computer Center East China Normal

More information

Heuristic Clustering Algorithms in Ad hoc Networks

Heuristic Clustering Algorithms in Ad hoc Networks Heuristic Clustering Algorithms in Ad hoc Networks Artvin Çoruh University e-mail: nevin.aydin@gmail.com Volume 3 No 3 (2014) ISSN 2158-8708 (online) DOI 10.5195/emaj.2014.39 http://emaj.pitt.edu Abstract

More information

Hierarchical Structured Multi-agent for Distributed Databases in Location Based Services

Hierarchical Structured Multi-agent for Distributed Databases in Location Based Services Hierarchical Structured Multi-agent for Distributed Databases in Based Services Romeo Mark A. Mateo 1, Jaewan Lee 1 and Oh-Hyun Kwon 2 1 School of Electronic and Information Engineering, Kunsan National

More information

Systems Infrastructure for Data Science. Web Science Group Uni Freiburg WS 2014/15

Systems Infrastructure for Data Science. Web Science Group Uni Freiburg WS 2014/15 Systems Infrastructure for Data Science Web Science Group Uni Freiburg WS 2014/15 Lecture II: Indexing Part I of this course Indexing 3 Database File Organization and Indexing Remember: Database tables

More information

Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks

Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks Peng-Jun Wan Khaled M. Alzoubi Ophir Frieder Abstract Connected dominating set (CDS) has been proposed as virtual backbone

More information

Splitter Placement in All-Optical WDM Networks

Splitter Placement in All-Optical WDM Networks plitter Placement in All-Optical WDM Networks Hwa-Chun Lin Department of Computer cience National Tsing Hua University Hsinchu 3003, TAIWAN heng-wei Wang Institute of Communications Engineering National

More information

Novel Cluster Based Routing Protocol in Wireless Sensor Networks

Novel Cluster Based Routing Protocol in Wireless Sensor Networks ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 32 Novel Cluster Based Routing Protocol in Wireless Sensor Networks Bager Zarei 1, Mohammad Zeynali 2 and Vahid Majid Nezhad 3 1 Department of Computer

More information

Research on Relative Coordinate Localization of Nodes Based on Topology Control

Research on Relative Coordinate Localization of Nodes Based on Topology Control Journal of Information Hiding and Multimedia Signal Processing c 2018 ISSN 2073-4212 Ubiquitous International Volume 9, Number 2, March 2018 Research on Relative Coordinate Localization of Nodes Based

More information

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Fatiha Djemili Tolba University of Haute Alsace GRTC Colmar, France fatiha.tolba@uha.fr Damien Magoni University

More information

INVESTIGATION ON THROUGHPUT OF A MULTI HOP NETWORK WITH IDENTICAL STATION FOR RANDOM FAILURE

INVESTIGATION ON THROUGHPUT OF A MULTI HOP NETWORK WITH IDENTICAL STATION FOR RANDOM FAILURE International Journal of Computer cience and Communication Vol. 2, No. 2, July-December 2011, pp. 559-564 INVETIGATION ON THROUGHPUT OF A MULTI HOP NETWORK WITH IDENTICAL TATION FOR RANDOM FAILURE Manish

More information

A Centralized Approaches for Location Management in Personal Communication Services Networks

A Centralized Approaches for Location Management in Personal Communication Services Networks A Centralized Approaches for Location Management in Personal Communication Services Networks Fahamida Firoze M. Tech. (CSE) Scholar, Deptt. Of CSE, Al Falah School of Engineering & Technology, Dhauj, Faridabad,

More information

Figure 1. Clustering in MANET.

Figure 1. Clustering in MANET. Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks

Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks Sangheon Pack and Yanghee Choi School of Computer Science & Engineering Seoul National University Seoul, Korea Abstract Next-generation

More information

A Connection between Network Coding and. Convolutional Codes

A Connection between Network Coding and. Convolutional Codes A Connection between Network Coding and 1 Convolutional Codes Christina Fragouli, Emina Soljanin christina.fragouli@epfl.ch, emina@lucent.com Abstract The min-cut, max-flow theorem states that a source

More information

Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks

Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks Yiwei Wu Department of Computer Science Georgia State University Email: wyw@cs.gsu.edu Yingshu Li Department of Computer

More information

An efficient handover and channel management approach in integrated network

An efficient handover and channel management approach in integrated network gopalax -International Journal of Technology And Engineering System(IJTES): Jan March 2011- Vol.2.No.2. An efficient handover and channel management approach in integrated network A.Sivagami 1, I.Marie

More information

An Adaptive Routing Scheme for Wireless Mobile Computing

An Adaptive Routing Scheme for Wireless Mobile Computing An Adaptive Routing Scheme for Wireless Mobile Computing Ruixi Yuan C&C Software Technology Center, NEC Systems Laboratory, Inc. 1901 Gateway Drive, Irving, TX 75038 yuan@syl.dl.nec.com Abstract This paper

More information

Reducing the Size of Routing Tables for Large-scale Network Simulation

Reducing the Size of Routing Tables for Large-scale Network Simulation Reducing the Size of Routing Tables for Large-scale Network Simulation Akihito Hiromori, Hirozumi Yamaguchi, Keiichi Yasumoto, Teruo Higashino and Kenichi Taniguchi Graduate School of Engineering Science,

More information

DESIGN AND IMPLEMENTATION OF VARIABLE RADIUS SPHERE DECODING ALGORITHM

DESIGN AND IMPLEMENTATION OF VARIABLE RADIUS SPHERE DECODING ALGORITHM DESIGN AND IMPLEMENTATION OF VARIABLE RADIUS SPHERE DECODING ALGORITHM Wu Di, Li Dezhi and Wang Zhenyong School of Electronics and Information Engineering, Harbin Institute of Technology, Harbin, China

More information

The Memetic Algorithm for The Minimum Spanning Tree Problem with Degree and Delay Constraints

The Memetic Algorithm for The Minimum Spanning Tree Problem with Degree and Delay Constraints The Memetic Algorithm for The Minimum Spanning Tree Problem with Degree and Delay Constraints Minying Sun*,Hua Wang* *Department of Computer Science and Technology, Shandong University, China Abstract

More information

Randomized rounding of semidefinite programs and primal-dual method for integer linear programming. Reza Moosavi Dr. Saeedeh Parsaeefard Dec.

Randomized rounding of semidefinite programs and primal-dual method for integer linear programming. Reza Moosavi Dr. Saeedeh Parsaeefard Dec. Randomized rounding of semidefinite programs and primal-dual method for integer linear programming Dr. Saeedeh Parsaeefard 1 2 3 4 Semidefinite Programming () 1 Integer Programming integer programming

More information

Target Tracking in Wireless Sensor Network

Target Tracking in Wireless Sensor Network International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 6 (2014), pp. 643-648 International Research Publications House http://www. irphouse.com Target Tracking in

More information

Data Partitioning. Figure 1-31: Communication Topologies. Regular Partitions

Data Partitioning. Figure 1-31: Communication Topologies. Regular Partitions Data In single-program multiple-data (SPMD) parallel programs, global data is partitioned, with a portion of the data assigned to each processing node. Issues relevant to choosing a partitioning strategy

More information

Data Communication and Parallel Computing on Twisted Hypercubes

Data Communication and Parallel Computing on Twisted Hypercubes Data Communication and Parallel Computing on Twisted Hypercubes E. Abuelrub, Department of Computer Science, Zarqa Private University, Jordan Abstract- Massively parallel distributed-memory architectures

More information

R-Trees. Accessing Spatial Data

R-Trees. Accessing Spatial Data R-Trees Accessing Spatial Data In the beginning The B-Tree provided a foundation for R- Trees. But what s a B-Tree? A data structure for storing sorted data with amortized run times for insertion and deletion

More information

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng

More information

Object Placement in Shared Nothing Architecture Zhen He, Jeffrey Xu Yu and Stephen Blackburn Λ

Object Placement in Shared Nothing Architecture Zhen He, Jeffrey Xu Yu and Stephen Blackburn Λ 45 Object Placement in Shared Nothing Architecture Zhen He, Jeffrey Xu Yu and Stephen Blackburn Λ Department of Computer Science The Australian National University Canberra, ACT 2611 Email: fzhen.he, Jeffrey.X.Yu,

More information

CROSS LAYER USING END-TO-END DELAY ASSESSMENT FOR ROUTING PROTOCOL IN VEHICULAR AD HOC NETWORK

CROSS LAYER USING END-TO-END DELAY ASSESSMENT FOR ROUTING PROTOCOL IN VEHICULAR AD HOC NETWORK CROSS LAYER USING END-TO-END DELAY ASSESSMENT FOR ROUTING PROTOCOL IN VEHICULAR AD HOC NETWORK Le Van Minh a,b, Yang MingChuan a, and Guo Qing a a Communication research center, Harbin Institute of Technology,

More information

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks Satyabrata Pradhan, Yi Li, and Muthucumaru Maheswaran Advanced Networking Research Laboratory Department of Computer Science University

More information

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department

More information

Reversing Ticket Based Probing Routing Protocol for MANET

Reversing Ticket Based Probing Routing Protocol for MANET Reversing Ticket Based Probing Routing Protocol for MANET TURGUT YUCEL and MIN SONG Department of Electrical and Computer Engineering Old Dominion University Norfolk, VA 23529 U.S.A. http://www.odu.edu/networking

More information

Avoidance of Bottleneck in PCS Network

Avoidance of Bottleneck in PCS Network Avoidance of Bottleneck in PCS Network Sidhi Pandey 1, Alka 2, Pratima Singh 3 1, 2, 3 (Computer Science & Engineering, Institute of Technology & Management, India) Abstract: This paper contains the concept

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

An Improved Inter-Domain Handover Scheme Based on a Bidirectional Cooperative Relay

An Improved Inter-Domain Handover Scheme Based on a Bidirectional Cooperative Relay BULGARIAN ACADEMY OF CIENCE CYBERNETIC AND INFORMATION TECHNOLOGIE Volume 13, No 4 ofia 2013 Print IN: 1311-9702; Online IN: 1314-4081 DOI: 10.2478/cait-2013-0059 An Improved Inter-Domain Handover cheme

More information

A Review on various Location Management and Update Mechanisms in Mobile Communication

A Review on various Location Management and Update Mechanisms in Mobile Communication International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 2 No. 2 Jun. 2014, pp. 268-274 2014 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/

More information

Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks

Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks Guangyan Huang 1, Xiaowei Li 1, and Jing He 1 Advanced Test Technology Lab., Institute of Computing Technology, Chinese

More information

Open Access The Three-dimensional Coding Based on the Cone for XML Under Weaving Multi-documents

Open Access The Three-dimensional Coding Based on the Cone for XML Under Weaving Multi-documents Send Orders for Reprints to reprints@benthamscience.ae 676 The Open Automation and Control Systems Journal, 2014, 6, 676-683 Open Access The Three-dimensional Coding Based on the Cone for XML Under Weaving

More information

New Challenges In Dynamic Load Balancing

New Challenges In Dynamic Load Balancing New Challenges In Dynamic Load Balancing Karen D. Devine, et al. Presentation by Nam Ma & J. Anthony Toghia What is load balancing? Assignment of work to processors Goal: maximize parallel performance

More information

ISSN 2319-8885 Vol.03,Issue.35 November-2014, Pages:6974-6978 www.ijsetr.com A Caching Scheme in Location Based Application SANDI WINN AYE 1, ZAR ZAR WINT 2 1 Dept of Information and Communication Technology,

More information

Energy Optimized Routing Algorithm in Multi-sink Wireless Sensor Networks

Energy Optimized Routing Algorithm in Multi-sink Wireless Sensor Networks Appl. Math. Inf. Sci. 8, No. 1L, 349-354 (2014) 349 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/10.12785/amis/081l44 Energy Optimized Routing Algorithm in Multi-sink

More information

ENGI 4557 Digital Communications Practice Problems 2017 (Part 2)

ENGI 4557 Digital Communications Practice Problems 2017 (Part 2) ENGI 4557 Digital Communications Practice Problems 207 (Part 2) H = n p i log 2 ( ) p i C = W log 2 ( + S N ) SNR = 6m + 0 log 0 ( 3σ2 x V ) 2 SNR = 6m 0 ( ) n n! = k k!(n k)! x = σ 2 = + + x p(x)dx (x

More information

Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud

Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud 2016 International Conference on Service Science, Technology and Engineering (SSTE 2016) ISBN: 978-1-60595-351-9 Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

Master s Thesis. A Construction Method of an Overlay Network for Scalable P2P Video Conferencing Systems

Master s Thesis. A Construction Method of an Overlay Network for Scalable P2P Video Conferencing Systems Master s Thesis Title A Construction Method of an Overlay Network for Scalable P2P Video Conferencing Systems Supervisor Professor Masayuki Murata Author Hideto Horiuchi February 14th, 2007 Department

More information

The Fulfillment of Design and Simulation for Bandwidth Allocation Algorithm Based on User Satisfaction and Profit

The Fulfillment of Design and Simulation for Bandwidth Allocation Algorithm Based on User Satisfaction and Profit 2011 International Conference on Information Communication and Management IPCSIT vol.16 (2011) (2011) IACSIT Press, Singapore The Fulfillment of Design and Simulation for andwidth Allocation Algorithm

More information

Parallel Algorithm for Multilevel Graph Partitioning and Sparse Matrix Ordering

Parallel Algorithm for Multilevel Graph Partitioning and Sparse Matrix Ordering Parallel Algorithm for Multilevel Graph Partitioning and Sparse Matrix Ordering George Karypis and Vipin Kumar Brian Shi CSci 8314 03/09/2017 Outline Introduction Graph Partitioning Problem Multilevel

More information

Online Optimization of VM Deployment in IaaS Cloud

Online Optimization of VM Deployment in IaaS Cloud Online Optimization of VM Deployment in IaaS Cloud Pei Fan, Zhenbang Chen, Ji Wang School of Computer Science National University of Defense Technology Changsha, 4173, P.R.China {peifan,zbchen}@nudt.edu.cn,

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

Performance Study of Routing Algorithms for LEO Satellite Constellations

Performance Study of Routing Algorithms for LEO Satellite Constellations Performance Study of Routing Algorithms for LEO Satellite Constellations Ioannis Gragopoulos, Evangelos Papapetrou, Fotini-Niovi Pavlidou Aristotle University of Thessaloniki, School of Engineering Dept.

More information

Edge Equalized Treemaps

Edge Equalized Treemaps Edge Equalized Treemaps Aimi Kobayashi Department of Computer Science University of Tsukuba Ibaraki, Japan kobayashi@iplab.cs.tsukuba.ac.jp Kazuo Misue Faculty of Engineering, Information and Systems University

More information

Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET

Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET 1 Prashant Dixit* Department of CSE FET, Manavrachna international institute of research

More information

Active source routing for ad-hoc network: seamless integration of wireless environment

Active source routing for ad-hoc network: seamless integration of wireless environment Active source routing for ad-hoc network: seamless integration of wireless environment 1. Introduction Active networking is the emerging technology that will provide new network environment where lots

More information

Job Re-Packing for Enhancing the Performance of Gang Scheduling

Job Re-Packing for Enhancing the Performance of Gang Scheduling Job Re-Packing for Enhancing the Performance of Gang Scheduling B. B. Zhou 1, R. P. Brent 2, C. W. Johnson 3, and D. Walsh 3 1 Computer Sciences Laboratory, Australian National University, Canberra, ACT

More information

AUV Cruise Path Planning Based on Energy Priority and Current Model

AUV Cruise Path Planning Based on Energy Priority and Current Model AUV Cruise Path Planning Based on Energy Priority and Current Model Guangcong Liu 1, Hainan Chen 1,2, Xiaoling Wu 2,*, Dong Li 3,2, Tingting Huang 1,, Huawei Fu 1,2 1 Guangdong University of Technology,

More information

Lifetime Enhancement of Wireless Sensor Networks using Duty Cycle, Network Coding and Cluster Head Selection Algorithm

Lifetime Enhancement of Wireless Sensor Networks using Duty Cycle, Network Coding and Cluster Head Selection Algorithm Lifetime Enhancement of Wireless Sensor Networks using Cycle, Network Coding and Cluster Head Selection Algorithm 1 Mrunal V. Funde, B.D.C.E Sevagram,Maharashtra,India, 2 Dr. M.A. Gaikwad, Principal, B.D.C.E

More information

Mobile Element Scheduling for Efficient Data Collection in Wireless Sensor Networks: A Survey

Mobile Element Scheduling for Efficient Data Collection in Wireless Sensor Networks: A Survey Journal of Computer Science 7 (1): 114-119, 2011 ISSN 1549-3636 2011 Science Publications Mobile Element Scheduling for Efficient Data Collection in Wireless Sensor Networks: A Survey K. Indra Gandhi and

More information

Project Participants

Project Participants Annual Report for Period:10/2004-10/2005 Submitted on: 06/21/2005 Principal Investigator: Yang, Li. Award ID: 0414857 Organization: Western Michigan Univ Title: Projection and Interactive Exploration of

More information

Regression Based Cluster Formation for Enhancement of Lifetime of WSN

Regression Based Cluster Formation for Enhancement of Lifetime of WSN Regression Based Cluster Formation for Enhancement of Lifetime of WSN K. Lakshmi Joshitha Assistant Professor Sri Sai Ram Engineering College Chennai, India lakshmijoshitha@yahoo.com A. Gangasri PG Scholar

More information

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet

More information

Adaptive, Distributed Location Management in Mobile, Wireless Networks

Adaptive, Distributed Location Management in Mobile, Wireless Networks Adaptive, Distributed Location Management in Mobile, Wireless Networks Kevin Lee Sanjay Jha Nirupama Bulusu {kevinl, sjha, nbulusu}@cse.unsw.edu.au Abstract Location management refers to the problem of

More information

Seminar on. A Coarse-Grain Parallel Formulation of Multilevel k-way Graph Partitioning Algorithm

Seminar on. A Coarse-Grain Parallel Formulation of Multilevel k-way Graph Partitioning Algorithm Seminar on A Coarse-Grain Parallel Formulation of Multilevel k-way Graph Partitioning Algorithm Mohammad Iftakher Uddin & Mohammad Mahfuzur Rahman Matrikel Nr: 9003357 Matrikel Nr : 9003358 Masters of

More information

Low Power Hitch-hiking Broadcast in Ad Hoc Wireless Networks

Low Power Hitch-hiking Broadcast in Ad Hoc Wireless Networks Low Power Hitch-hiking Broadcast in Ad Hoc Wireless Networks Mihaela Cardei, Jie Wu, and Shuhui Yang Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 {mihaela,jie}@cse.fau.edu,

More information

High Capacity Reversible Watermarking Scheme for 2D Vector Maps

High Capacity Reversible Watermarking Scheme for 2D Vector Maps Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration

More information

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

The Comparative Study of Machine Learning Algorithms in Text Data Classification* The Comparative Study of Machine Learning Algorithms in Text Data Classification* Wang Xin School of Science, Beijing Information Science and Technology University Beijing, China Abstract Classification

More information

CSE 5306 Distributed Systems

CSE 5306 Distributed Systems CSE 5306 Distributed Systems Naming Jia Rao http://ranger.uta.edu/~jrao/ 1 Naming Names play a critical role in all computer systems To access resources, uniquely identify entities, or refer to locations

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

Performance Evaluation in MANET by Using NCPR Scheme with Cluster Technique

Performance Evaluation in MANET by Using NCPR Scheme with Cluster Technique International Journal of Emerging Engineering Research and Technology Volume 3, Issue 7, July 2015, PP 22-31 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Performance Evaluation in MANET by Using NCPR

More information

Distributed STDMA in Ad Hoc Networks

Distributed STDMA in Ad Hoc Networks Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network Volume 118 No. 7 2018, 501-505 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu CASER Protocol Using DCFN Mechanism in Wireless Sensor Network A.Shirly

More information

Filters for XML-based Service Discovery in Pervasive Computing

Filters for XML-based Service Discovery in Pervasive Computing Filters for XML-based Service Discovery in Pervasive Computing Georgia Koloniari and Evaggelia Pitoura Department of Computer Science, University of Ioannina, GR45110 Ioannina, Greece {kgeorgia, pitoura}@cs.uoi.gr

More information

Striped Grid Files: An Alternative for Highdimensional

Striped Grid Files: An Alternative for Highdimensional Striped Grid Files: An Alternative for Highdimensional Indexing Thanet Praneenararat 1, Vorapong Suppakitpaisarn 2, Sunchai Pitakchonlasap 1, and Jaruloj Chongstitvatana 1 Department of Mathematics 1,

More information

Load Balancing Algorithm over a Distributed Cloud Network

Load Balancing Algorithm over a Distributed Cloud Network Load Balancing Algorithm over a Distributed Cloud Network Priyank Singhal Student, Computer Department Sumiran Shah Student, Computer Department Pranit Kalantri Student, Electronics Department Abstract

More information

8. Secondary and Hierarchical Access Paths

8. Secondary and Hierarchical Access Paths 8. Secondary and Access Paths Theo Härder www.haerder.de Main reference: Theo Härder, Erhard Rahm: Datenbanksysteme Konzepte und Techniken der Implementierung, Springer, 2, Chapter 8. Patrick O Neil, Elizabeth

More information

Parallel Algorithm Design. Parallel Algorithm Design p. 1

Parallel Algorithm Design. Parallel Algorithm Design p. 1 Parallel Algorithm Design Parallel Algorithm Design p. 1 Overview Chapter 3 from Michael J. Quinn, Parallel Programming in C with MPI and OpenMP Another resource: http://www.mcs.anl.gov/ itf/dbpp/text/node14.html

More information

A Privacy Preserving Model for Ownership Indexing in Distributed Storage Systems

A Privacy Preserving Model for Ownership Indexing in Distributed Storage Systems A Privacy Preserving Model for Ownership Indexing in Distributed Storage Systems Tiejian Luo tjluo@ucas.ac.cn Zhu Wang wangzhubj@gmail.com Xiang Wang wangxiang11@mails.ucas.ac.cn ABSTRACT The indexing

More information

An Enhancement of Mobile IP by Home Agent Handover

An Enhancement of Mobile IP by Home Agent Handover An Enhancement of Mobile IP by Home Agent Handover Li-Sheng Yu and Chun-Chuan Yang Multimedia and Communications Laboratory Department of Computer Science and Information Engineering National Chi Nan University,

More information

Frequency and Time Resource Allocation for Enhanced Interference Management in a Heterogeneous Network based on the LTE-Advanced

Frequency and Time Resource Allocation for Enhanced Interference Management in a Heterogeneous Network based on the LTE-Advanced ICWMC 23 : The Ninth International Conference on Wireless and Mobile Communications Frequency and Time Resource Allocation for Enhanced Interference Management in a Heterogeneous Network based on the LTE-Advanced

More information

A priority based dynamic bandwidth scheduling in SDN networks 1

A priority based dynamic bandwidth scheduling in SDN networks 1 Acta Technica 62 No. 2A/2017, 445 454 c 2017 Institute of Thermomechanics CAS, v.v.i. A priority based dynamic bandwidth scheduling in SDN networks 1 Zun Wang 2 Abstract. In order to solve the problems

More information

Dynamic Load Partitioning Strategies for Managing Data of Space and Time Heterogeneity in Parallel SAMR Applications

Dynamic Load Partitioning Strategies for Managing Data of Space and Time Heterogeneity in Parallel SAMR Applications Dynamic Load Partitioning Strategies for Managing Data of Space and Time Heterogeneity in Parallel SAMR Applications Xiaolin Li and Manish Parashar The Applied Software Systems Laboratory Department of

More information

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Pouya Ostovari Department of Computer and Information Siences Temple University Philadelphia, Pennsylvania, USA Email: ostovari@temple.edu

More information

TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME

TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME International Journal of Wireless Communications and Networking 3(1), 2011, pp. 89-93 TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME A. Wims Magdalene Mary 1 and S. Smys 2 1 PG Scholar,

More information

An Energy Efficient and Minimum Latency Routing Protocol for Multihop WSNs

An Energy Efficient and Minimum Latency Routing Protocol for Multihop WSNs An Energy Efficient and Minimum Latency Routing Protocol for Multihop WSNs Changyan Yi and Ken Ferens Electrical and Computer Engineering, University of Manitoba, Winnipeg, MB, Canada yic3@cc.umanitoba.ca,

More information

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks Ayad Salhieh Department of Electrical and Computer Engineering Wayne State University Detroit, MI 48202 ai4874@wayne.edu Loren

More information

Research and Implementation of the Key Technology of UAV Aerial Image. Transmission

Research and Implementation of the Key Technology of UAV Aerial Image. Transmission Research and Implementation of the Key Technology of UAV Aerial Image Transmission Fan Yijun No.1 Institute of Geological & Mineral Resources Survey of Henan Lluoyang, 471023, Henan Provincial Key Laboratory

More information

Study of Load Balancing Schemes over a Video on Demand System

Study of Load Balancing Schemes over a Video on Demand System Study of Load Balancing Schemes over a Video on Demand System Priyank Singhal Ashish Chhabria Nupur Bansal Nataasha Raul Research Scholar, Computer Department Abstract: Load balancing algorithms on Video

More information

Applying Data Mining to Wireless Networks

Applying Data Mining to Wireless Networks Applying Data Mining to Wireless Networks CHENG-MING HUANG 1, TZUNG-PEI HONG 2 and SHI-JINN HORNG 3,4 1 Department of Electrical Engineering National Taiwan University of Science and Technology, Taipei,

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

9 Distributed Data Management II Caching

9 Distributed Data Management II Caching 9 Distributed Data Management II Caching In this section we will study the approach of using caching for the management of data in distributed systems. Caching always tries to keep data at the place where

More information

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols 1th WEA International Conference on COMMUICATIO, Heraklion, reece, July 3-5, 8 Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

More information

Excavation Balance Routing Algorithm Simulation Based on Fuzzy Ant Colony

Excavation Balance Routing Algorithm Simulation Based on Fuzzy Ant Colony 2018 5th International Conference on Electrical & Electronics Engineering and Computer Science (ICEEECS 2018) Excavation Balance Routing Algorithm Simulation Based on Fuzzy Ant Colony Luo Xiaojuan, Yan

More information

CSE 5306 Distributed Systems. Naming

CSE 5306 Distributed Systems. Naming CSE 5306 Distributed Systems Naming 1 Naming Names play a critical role in all computer systems To access resources, uniquely identify entities, or refer to locations To access an entity, you have resolve

More information

Energy Conservation of Sensor Nodes using LMS based Prediction Model

Energy Conservation of Sensor Nodes using LMS based Prediction Model Energy Conservation of Sensor odes using LMS based Prediction Model Anagha Rajput 1, Vinoth Babu 2 1, 2 VIT University, Tamilnadu Abstract: Energy conservation is one of the most concentrated research

More information

The General Analysis of Proactive Protocols DSDV, FSR and WRP

The General Analysis of Proactive Protocols DSDV, FSR and WRP Volume 116 No. 10 2017, 375-380 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu The General Analysis of Proactive Protocols DSDV, FSR and WRP 1 Dr.

More information

Design and Development of a

Design and Development of a Chapter 6 Design and Development of a Clustered Network 6.1 Introduction In ad hoc networks, nodes are distributed randomly and they are identified by their unique IDs. In such a network, the execution

More information

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks William Shaw 1, Yifeng He 1, and Ivan Lee 1,2 1 Department of Electrical and Computer Engineering, Ryerson University, Toronto,

More information