Improved flooding of broadcast messages using extended multipoint relaying

Size: px
Start display at page:

Download "Improved flooding of broadcast messages using extended multipoint relaying"

Transcription

1 Improved flooding of broadast messages using extended multipoint relaying Pere Montolio Aranda a, Joaquin Garia-Alfaro a,b, David Megías a a Universitat Oberta de Catalunya, Estudis d Informàtia, Mulimèdia i Teleomuniaió. Rambla del Poblenou 156, 818, Barelona, Spain b Institut Téléom. Dépt. Logique des Usages, Sienes Soiales et de l Information. Téléom Bretagne, Césson-Sévigné, CS 1767, 35576, Frane s: pma@uo.edu,joaquin.garia-alfaro@am.org,dmegias@uo.edu Abstrat A ommon operation in wireless ad ho networks is the flooding of broadast messages to establish network topologies and routing tables. The flooding of broadast messages is, however, a resoure onsuming proess. It might require the retransmission of messages by most network nodes. It is, therefore, very important to optimize this operation. In this paper, we first analyze the multipoint relaying (MPR) flooding mehanism used by the Optimized Link State Routing (OLSR) protool to distribute topology ontrol (TC) messages among all the system nodes. We then propose a new flooding method, based on the fusion of two key onepts: distane-enabled multipoint relaying and onneted dominating set (CDS) flooding. We present experimental simulations that show that our approah improves the performane of previous existing proposals. Key words: Wireless, Ad Ho Networks, Network Flooding, OLSR, MPR, CDS. 1. Introdution Wireless ad ho networks are generally onstruted without a preestablished struture. The nodes are in harge of disovering the system topology that will eventually allow them to work together. Two usual mehanisms to share information between the network nodes are: (1) point-to-point, in whih a node sends its messages towards a unique destination; and () flooding of broadast messages, in whih a node broadasts a message to all its neighbors, and those neighbors (or part of them) forward, reursively, the original message to eah node of the network [1]. The flooding proess an be used at several logial levels [, 3]. For instane, it an be used at the appliation level (when a node needs to send information to eah node of the network with a query or a delaration of data interest); or at the network ontrol level (for the onsolidation of the network struture, existene of nodes, or the harateristis and availability of the network links). These network ontrol messages must be sent not only during the network onsolidation stage, but also during all the network life (in order to update the nodes with environmental and network hanges). The resoure onsumption of flooding a network is, in general, very high. It needs several data transmission ations to be exeuted by high number of nodes in the network. For this reason, the optimization of any flooding mehanism is mandatory. In this sense, the Optimized Link State Routing (OLSR) protool [4] suggests an optimization for the flooding of broadast network onsolidation messages on ad ho networks based on multipoint relaying (MPR) flooding. Afterwards, it is possible to optimize the flooding of the remaining broadast messages by reorganizing the initial MPR flooding mehanism into a Conneted Dominating Set (CDS) struture. In this paper, we analyze these methods and transformations formally and then, we present the design of an alternative variant based on the use of an extended multipoint relaying flooding that improves the performane of the resulting CDS struture highly. We present a series of simulations that show the validity of our approah, and that reveal that our method onsiderably improves the performane of previous existing proposals. Our proposal is, moreover, ompatible with the forthoming evolutions of the OLSR protool (referred as OLSRv in the literature), by addressing the skethed extended quality riteria, suh as the seurity aspets of the resulting new protool [9, 1]. Notation Some basi notations are neessary to desribe the proposals and operations we present in this work: dist(i, j) : distane, in hops, from node i to node j. N 1 (x) = {y dist(x, y) = 1}: neighbors of a node, i.e., adjaent nodes. N * 1 (x) = N 1(x) {x}: neighbors of a node x, inluding the node itself. N * 1(X) = x X N * 1(x), neighbors of a set, inluding the set itself. N d * (X), neighbors of a { set at a distane in hops lower or X, if d =, equal to d: N d *(X) = N d 1 * (N 1(X)), * if d >. N d (X) = N d *(X) \ N d 1 * (X), neighbors of a set at a distane, in hops, stritly equal to d. Preprint submitted to Elsevier Otober, 1

2 Paper organization Setion presents the MPR seletion problem and desribes some appropriate implementation methods. Setion 3 analyzes the flooding proess of the OLSR protool and points out some drawbaks and early improvements. Setion 4 proposes our alternative variant. Setion 5 presents experimental evaluations and shows the performane results obtained with our proposal. Setion 6 loses the paper.. Multipoint relay (MPR) seletion The multipoint relay (MPR) seletion problem appears as an early stage of the OLSR routing protool. The original problem formulation is as follows: given a network node x, find a minimal subset of nodes, MPR(x), inluded in their immediate neighborhood with the harateristi that any node at a two-hop distane from x is a neighbor of, at least, a node in the MPR: MPR(x) N 1 (x), N (x) N 1 (MPR(x)). It is a quality objetive that MPR(x) must have minimal number of elements. It an be demonstrated, moreover, that finding the minimal solution is an NP-omplex problem [5], sine finding a solution is exponential in exeution time relative to the number of nodes in N 1 (x). The original MPR seletion problem an be generalized with the following formulation: given a set C of andidate nodes and a set T of target nodes, where all target nodes are neighbors of at least one andidate node (T N 1 (C)), find a subset MPR(C, T) inluded in C with minimal size and the harateristi that any node of T is a neighbor of (i.e., it is overed by) a node in MPR(C, T). It might not always be possible to fulfill these onditions if one node in T has not enough (i.e., m vg ) valid andidates in C. If that happens, the seond ondition must be relaxed to inlude all available neighbors. The resulting ondition is, hene, rewritten as follows: MPR(C, T, m vg ) C, y, y T N 1 (y) MPR(C, T, m vg ) m vg N 1 (y) C MPR(C, T, m vg )... MPR seletion as the solution of a restritions problem The MPR problem without extra overage an be seen as the solution of a boolean satisfiability problem. The variables of this problem are as many booleans as elements in C. The false value means that this element of C is not inluded in the set MPR(C, T), whereas the true value means that this element of C is inluded in MPR(C, T). These variables are denoted as, 1,, and so on. Eah node in T adds a new restrition to the set of possible solutions of the problem. This rule is an or ondition for the variables related to their neighbors in C. The objetive is to set to true a minimal number of variables x, suh that all rules are true. Assume the network depited in Figure 1, where gray nodes represent the set C and white nodes the set T. Preondition: T N 1 (C), MPR(C, T) C, T N 1 (MPR(C, T)). The quality riteria is to minimize the number of elements in MPR(C, T). From the formulation, it is straightforward to note that the original problem desribed in the OLSR standard is a partiular instane of this one, when C = N 1 (x) and T = N (x). The same onditions an be rewritten as follows: Preondition: T N 1 (C), MPR(C, T) C, y, y T N 1 (y) MPR(C, T) MPR seletion with extra overage In some network deployments, it is mandatory that any node in T must be neighbor of more than one node in the MPR set. This minimum number of nodes is refereed as the MPR overage (denoted here as m vg ) in the OLSR protool (f. RFC 366 [4], Setion 16). The previous problem formulation was the one for whih the m vg fator is equal to one. The generalized onditions for any given m vg are the following: MPR(C, T, m vg ) C, y, y T N 1 (y) MPR(C, T, m vg ) m vg. Figure 1: MPR problem example. We an observe that node 5 has two neighbors in C, nodes and. Thus, it generates the restrition. The remaining nodes in T generate the following restritions: t 5 :, t 6 :, t 7 :, t 8 :, t 9 : 1, t 1 : 1, t 11 : 1, t 1 : 1, t 13 : 3,...

3 This problem has one optimal solution 1. The ombination 3 4 is also a solution although it is not minimal..3. Solution of a restritions problem with extra overage When the MPR overage parameter (m vg for short) is greater than one (f. RFC 366 [4], Setion 16), the problem must be reformulated. Eah node in C is now assoiated to an integer variable in, 1. Eah node in T adds one restrition to the set of possible solutions of the form addition of their neighbors greater or equal than the restrition. The previous example, now with m vg =, i.e., t 5 : + = = 1, t 6 : + = = 1,... t 9 : = = 1,... has only one possible solution 1 = = 3 = 4 = 5 = 1. Let us observe, from this example, that: Several nodes in C are mandatory in the MPR set. If one target node has a number of neigbors in C equal or smaller than the requested overage, these neigbors are mandatory in the MPR. Looking at the example depited in Figure 1, and if m vg =, it is obvious that node 5 fores and to be inluded in the MPR subset. This situation is very likely to happen. Indeed, in most of the experimental simulations that we present in Setion 5, this kind of poorly overed nodes are, in most ases, almost the 9% of the total nodes in C. Several nodes in T generate the same restrition, suh as nodes 5, 6, 7 and 8 depited in Figure 1. When a speifi stratgey, like the greedy strategy used in the OLSR protool [5], needs to assign a weight to eah andidate, those restritions generated by more than one node have, in general, a weight equal to one (or equal to the number of nodes that generate this ondition). In the next setion we see how these alternatives impat in the size of the obtained MPR set..4. Pratial implementations In general, there will always exist several solutions to the MPR seletion problem. The minimal MPR set (i.e., the set with minimal ardinality) that solves the seletion problem (hereinafter denoted as min ) an be omputed by using a brute fore strategy. However, the omplexity of this approah is so high that, in pratie, it only applies for small networks. The approah relies on simply testing all possible subsets until finding the minimal one that fulfills all the requested onditions. Optimized versions of a brute fore seletion, based on searh and retry heuristis, exist [5]. These variants add to the proedure a sorted test of the subsets and rules to prune the searh tree. These solutions still present, however, a very ostly omplexity that renders the proess still impratial for average systems. 3 A more pratial solution, based on a greedy seletion strategy, is summarized in Funtion 1. Funtion 1 gives a solution of a size smaller than min (1+log( min )) [5], where min refers to the size of the minimal set solution. A worst ase example is given in Figure 1. The steps of Funtion 1, when it is applied to the network depited in Figure 1, are the following: i) In the first iteration, node is seleted, sine it has eight neighbors in T not yet overed (an amount of neighbors greater than node (=7), node 1 (=7), node 3 (=4), and node 4 (=)). Restritions related to nodes 5 to 1 are fulfilled and removed. ii) In the seond iteration, node 3 is seleted (four neighbors). iii) In the last iteration, node 4 is seleted. Funtion 1 omputes the set MPR(C, T) = {, 3,4}. Note that the solution is not minimal. An alternative solution with exatly two nodes (MPR(C, T) = {, 1}) is also valid. This drawbak an be handled if the nodes in T that have the same neighbors than a previous one are filtered. In the network given in Figure 1, all white nodes an be filtered by this rule exept nodes 5, 9, 13, 15, 17, and 18. If so, Funtion 1 provides the solution MPR(C, T) = {, 1} that is, moreover, minimal. It is, therefore, better to apply a greedy strategy ounting only the number of different rules that a node fulfills, instead of the total number of rules. In general, if two or more nodes in T generate the same restrition, only one instane of the restrition must be addressed. An alternative solution is too give priority to those nodes that are poorly overed by the system. For example, in the example depited by Figure 1, we an observe that some nodes (e.g., node 1) are mandatory, sine they have neighbors in T that no other neighbor overs. Thus, a logial first step is the addition to the MPR of this kind of nodes. Then, the following step is to analyze the ases where a node in T has only two possible andidates. It is mandatory that one of these two andidates gets inluded in the MPR. Therefore, it seems a onvenient approah to start solving this restrition before proeeding with easier ones (i.e., rules with more possible andidates). If so, a new proedure an be proposed. Funtion summarizes the new approah. The new seletion mehanism tries to fulfill all restritions starting by the most restritive one (i.e., smaller number of variables in the rule, i.e., smaller number of nodes in C neighbors of the nodes in T ) until the less restritive rule (e.g., the rule ontaining the largest amount of variables or andidates). If suh a rule has only one assoiated andidate, the orresponding node is added to the MPR. Otherwise, if the Funtion 1. Greedy MPR Seletion 1. Start with an empty MPR set.. Look for the andidate whih is present in more restritions not yet fulfilled by any other andidate. At least one restrition must be found. 3. The node is added to the MPR set, remove this node from the andidates list and remove all restritions already fulfilled. 4. Repeat Steps 1 and until all restritions are overed or no more andidates are available. 5. Return the resulting MPR set.

4 rule has more than one andidate, a heuristi method to selet the best andidate applies (e.g., a greedy-like seletion strategy). We an finally lose the setion by defining the standard MPR seletion proedure used in the OLSR protool as a mixture of greedy seletion and most restritive rule first seletion. An overview of the omplete proess is summarized in Funtion 3. Funtion. Most Restritive First MPR Seletion 1. Start with an empty MPR set.. Selet the target node in T whih has smaller number of neighbors in the andidate set C. Let C be the set of these neighbors. 3. Look for the node inluded in C that has maximum number of neighbors in the target set T. 4. Add the node found in previous step to the MPR set. Remove it from C. Derease the number of pending MPRs for all their neigbors in T. If the node has reahed the requested overage, remove it from T. 5. Repeat from the first step until T or C are empty. 6. Return the resulting MPR set. Funtion 3. Standard OLSR MPR Seletion 1. Start with an empty MPR set.. Apply Funtion, i.e., most restritive rules first, to selet those andidates whih appear in a rule of a size that is lower than the m vg parameter. Add the nodes to the MPR set. 3. Apply Funtion 1, i.e., greedy seletion, until all the remainder rules are fulfilled. 4. Return the resulting MPR set. Proedure 1. Soure-independent Flooding 1. The node whih originates the message sends it to all its neighbors.. A node whih reeives the message forwards it to all its neighbors if and only if it is the first time it reeives the message AND the node belongs to the predefined subset of forwarders. Otherwise, the message is not forwarded. 3. Step is repeated until no more forwards are exeuted for the message. Proedure. OLSR s Standard MPR Flooding 1. The node that originates the message sends it to all its neighbors.. A node that reeives the message forwards it to all its neighbors if and only if it is the first time it reeives the message AND the sender of the reeived message is inluded in the node list of MPR seletors. If not, the message is not forwarded. 3. Step is repeated until no more message forwards are exeuted. onsiderably redued. Proedure summarizes the soure-dependent flooding proess defined in the standard OLSR protool [4]. Notie that the flooding method proposed in Proedure has an important drawbak when applied to faulty networks. Indeed, if delays in the transmission of a message an lead, for instane, to a situation suh that not all the network nodes reeive the message, the propagation time an produe a failure in the flooding proess (even when the retransmission handles the failure of any single message). For instane, let us onsider the sample network depited by Figure. If we now as- 3. Flooding of broadast messages A ommon strategy for flooding messages on a network is the use of a soure-independent proedure (f. Proedure 1). A subset of nodes is in harge of retransmitting messages. The subset must satisfy that any of its nodes suessfully reahes any other node in the network by a path that stays entirely within the subset itself. The ost in resoures to flood the network is proportional to the size of the subset. Therefore, the goal is to obtain an optimal subset (in terms of size). OLSR addresses the problem in a different way. It uses the seletion of MPRs that we introdued in Setion, followed by a souredependent flooding strategy that works as follows: a node forwards a broadast message if and only if (1) it is the first time this message has been reeived by the node and () the adjaent sender of the message has seleted the node as one of its MPRs. In other words, any message is disarded if it has been previously reeived or if it is reeived by non MPR nodes [11]. The method is alled soure-dependent, sine a node deides to forward messages by taking into aount the origin of suh messages. Hene, the total amount of forwards in the network is Figure : Example of failure in a soure dependent flooding. 7

5 sume that MPR(3) = {1, 5} and MPR(4) = {, 6}, we observe that any error or delay in the reeption of a given message may ause that some network nodes do not reeive the message they intend to flood (even when suh a message has been suessfully retransmitted). The aforementioned problem of delays does not affet a soureindependent flooding. Therefore, it is possible to improve the flooding mehanism of OLSR by ombining soure-independent flooding and multipoint relaying. The approah presented by Adjih et al. in [1] is a proper example of this ombination. The solution proposes the transformation of the original MPR struture into a Conneted Dominating Set (CDS). A CDS derived from a set V of nodes is defined in the following equation N * 1(CDS) = V onneted(cds), where a reursive definition of onneted is: onneted ({x}), onneted (X {y}) onneted(x) y N 1 (X). By satisfying the properties of a valid CDS, the transformation allows the use of a soure-independent flooding strategy while keeping the total amount of forwards in the network onsiderably low. The transformation method in [1] requires a numeri labeling of the nodes. This an be based, for instane, on the IP address of the nodes. Let N min be the smallest node identifier of a neighborhood. Then, the Adjih et al. s method selets as forwarders of the underlying CDS those nodes that satisfy the following ondition: The node identifier orresponds to N min The node is in the MPR of an adjaent node with N min. A variation of the previous method was proposed by Wu et al. in [14, 15]. The first part of the previous or ondition is slightly modified to redue the CDS size: (The node identifier orresponds to N min The node has, at least, two unonneted neighbors) The node is in the MPR of an adjaent node with N min. morphology methods applied to graph optimization [13]. In this sense, our method generalizes the notion of multipoint relaying, by adding distane knowledge. This way, it improves the seletion of an optimized subset of forwarders, organized as an underlying CDS flooding struture. It implements, moreover, soure independent flooding of broadast messages, handling the problem of delayed forwards pointed out in Setion 3 (and whih is an inherent limitation of the soure dependent flooding method proposed in the OLSR protool). Proedure 3. Distane-enabled CDS Flooding 1. Selet one node of the network s.. Obtain the maximum dist(s, j) for all nodes, d max. Notie that the ase d max = (i.e., a single node network) an be ignored. Let a variable d with initial value d max Define a node set P of pending nodes and initialize it with all network nodes. 4. Find the solution of MPR d (s) = MPR(N d (s), N d+1 (s)) using any of the methods desribed in Part I of this doument. 5. All network nodes j at a distane d from s and whih are dominated by previous set MPR d (s) but do not belong to it are removed from P : j N 1 (MPR d (s)) j / MPR d (s) dist(s, j) = d. 6. If d > then repeat steps 4 and 5 for d d The resulting CDS is the union of all previously omputed MPR subsets, that is : CDS = MPR (s)... MPR dmax 1(s) Sample onstrution Assume the sample network depited in Figure 3. In the sequel, we summarize the exeution steps of Proedure 3 in order to ompute the underlying CDS-flooding struture for suh a network. The onstrution of this CDS-based forwarding subset, as a replaement of the multipoint relying set of any standard OLSR system, is laimed by the authors as a promising trade-off between minimization of forwarders and reliability of the exhanged information. Moreover, an inreased flood redundany an be ahieved by these methods if an MPR overage fator greater than one is settled during the MPR seletion state. In Setion 5, we show that this inrease leads, however, to a onsiderable performane overhead. In the sequel, we provide a new CDS-based flooding method, also ompatible with the addition of a dynami MPR overage parameter, that improves the performane of the standard OLSR flooding proedure, as well as the performane of the CDS-based flooding methods proposed in [1, 14, 15] Flooding method proposal In Proedure 3, we propose a new flooding method that optimizes the flooding proesses surveyed in Setion 3 and that allows the addition of extra overage (as suggested by Cuppens et al. in [7] for robustness reasons). Our solution gets inspiration from the use of mathematial 5 Figure 3: Sample network with node identifiers. Figure 4 shows the distane (in hops) from a node seleted as origin (node in this example) to all other nodes. The omputation of these distanes requires the knowledge of all the links in the system

6 3 3 t t 1 1 Figure 4: Proedure 3, Step. Distanes to node. Figure 6: Seond sequene, d = 1. t t t Figure 5: First sequene, d =. Figure 7: Final (trivial) sequene, d =. (already provided by an original onstrution of the OLSR system using multipoint relaying flooding). The maximal distane omputed is d max = 3. At distane d = 3, there are two nodes that are seleted as the targets of an MPR problem. The nodes at distane d = are the andidate nodes for this problem. In Figure 5, target nodes are labeled t and andidate nodes. Any of the MPR seletion funtions defined in Setion an now be used to solve the problem with T = {4, 8}, C = {, 3, 6,7}. The result is an MPR set equal to {3}. This is the first subset of nodes to be inluded in the final CDS. The next sequene handles nodes at distane d = (f. Figure 6). At this distane, we have four nodes. Two of them are already neighbors of a node in the CDS (nodes labeled by the symbol in the figure). Thus, the target nodes of the next MPR problem are the nodes in T = {, 3}. The andidate nodes are now all the nodes at distane d = 1, i.e., nodes in C = {1, 5}. Again, any valid MPR seletion funtion is used to solve the problem that results in the set MPR = {1}. This subset is added to the final CDS. Then, the proedure ontinues by handling the nodes at distane d = 1 (f. Figure 7). At this distane, the solution of the problem is now trivial. Note that although there are two nodes, only one of them is already neighbor of a node in the CDS. Thus, the only target node of the next MPR problem is in T = {1}. The only andidate node at distane d = is in C = {}. The result is MPR = {}. Therefore, node is added to the CDS. Figure 8 shows the final result, i.e., CDS = {, 1, 3}. We reall that, like in [1, 14, 15], our method requires an initial stage in whih a standard OLSR multipoint relaying flooding initially Figure 8: Resulting CDS subtopology derived from Proedure 3. sends TC messages to provide the list of links to eah node in the system. The ompleteness of this knowledge may impat in the quality of the obtained CDS. Let us also observe that a redution in the number of nodes of the CDS has a lear impat in the effiieny of the flooding proess (speially when nodes in the network are sparse). Thus, in sparse distributions of nodes, and when extra overage is required, some nodes are likely going to be poorly overed. If that ours, it an easily be solved by inreasing the MPR overage parameter. 6

7 5. Experimental simulations This setion presents experimental measurements that are performed to analyze and onfirm the main harateristis of the proesses desribed in previous setions. The experiments are exeuted in a simulation environment. Different onstrutions, with different densities of nodes and range of ommuniation, are deployed in a simulated unit square area. The deployment of nodes follows a random pattern with a uniform distribution in the x and y axes. The different MPR seletion funtions and flooding proedures are then applied to these networks. The series of experimental simulations are implemented using the Objetive Caml [6] programming language Evaluation of the MPR seletion funtions The objetive of our two initial simulations is simply to measure the average number of nodes inluded on the MPR sets omputed by the funtions we defined in Setion. A sample testbed (with five andidates and ten target nodes) is depited in Figure 9. The node that alulates the MPR sets in all three examples is node. The gray nodes represent the nodes seleted by node as MPRs. Eah set of experimental simulations ontains thirty andidate nodes and one hundred target nodes. All target nodes are, at least, linked to one andidate node. Additional links between targets and andidates nodes are reated at random. A network definition parameter, l, is used to fix the average number of links. It takes values from.4 (meaning more links between andidates and targets) to.15 (meaning a small number of links). One hundred different networks have been tested and averaged for eah value. Table 1 summarizes the results of the experimental simulations. Notie that the three MPR seletion methods provide almost the same ardinality MPR seletion method Average size of MPRs Funtion 1 (Greedy) 1.95 Funtion (Most restritive) 1.73 Funtion 3 (OLSR) 1.83 a) Greedy Seletion (f. Funtion 1) Table 1: Average MPR size vs. seletion funtions. In a seond experimental simulation, we measure the MPR overage parameter (m vg for short), applied to the standard OLSR seletion of MPRs (f. Funtion 3), and its effets on the size of the resulting MPRs. We do not show the results for Funtions 1 and, given that the differenes are minimal. The experimental setting is the same as in the previous series of simulations. The MPR overage fators are set to 1,, 3, and 4. Ten different networks are tested for eah set of parameters. The results of these tests are plotted in Figure 1. From the results of this seond series of simulations, we onlude that: (1) an inrease of the MPR overage fator in one unit inreases by, almost, a 5% the size of the resulting MPRs; and () that not all the nodes handle the requested MPR overage, i.e., there are always a onsiderably high amount of nodes that are poorly overed. b) Most Restritive First Seletion (f. Funtion ) m vg =1 m vg = m vg =3 m vg = Size of the MPR sets ) Standard OLSR seletion (f. Funtion 3) l=.4 l=.35 l=.3 l=.5 l=. l=.15 Link density Figure 9: Example of MPR set onstrutions based on three different MPR seletion methods. Gray nodes represent the nodes seleted as MPR nodes. Figure 1: MPR sizes for the OLSR seletion (Funtion 3) with extra overage. 7

8 5.. Handling delays with the standard MPR flooding The objetive of the following simulation is to analyze the sensibility of the standard MPR soure dependent flooding method (f. Proedure ) of the OLSR protool, when messages require extra retransmission due to reeption errors. Indeed, the simulations measure the ability of the OLSR proedure in ahieving this task. Eah simulation reates several random networks and omputes the retransmission of TC messages on eah network. The retransmission of the messages from a node towards its neighbors is onditioned by a probability of failure (provided as input parameters for eah simulation). In real senarios, we an assume that this failure might be aused by situations suh as interferenes, data orruption, or paket ollision in wireless networks. In ase of failure, the original message is disarded and its retransmission is queued. Although the message is never lost, this retransmission produes a delay in the reeption from some network nodes. This is the way how the simulations analyze the sensibility of the flooding proedure to the message delays. MPR-based CDS flooding methods proposed in [1, 14, 15] (f. Setion 3), and our proposal (f. Proedure 3). The results of the simulations are shown in Figure 1. The average number of nodes retransmitting the message is nodes with the MPR flooding method, for MPR-CDS method proposed by Adjih et al. [1], for MPR-CDS method proposed by Wu et al. [14, 15], and.54 for our proposed flooding method. Notie that our proposal presents a saving of resoures of almost a 5%. It also reahes a stable number of forwarders when the density of the network is high enough to over most of the unit square area. See, for example, the differenes from r =., n = 5 to n = 1 and to n = 15, where the number of forwarders when using our proposal remains stable whereas, in the other methods, this number ontinues inreasing proportionally to n. Similarly, our approah also reahes a stable number of forwards for ombinations r =.15, n = 15 and r =.15, n = MPR flooding Adjih et al. flooding Wu et al. flooding Our proposal Suessful floods 1% 95% 9% 85% Number of forwards % 75% n= r=.3 n=4 r=.3 n=5 n=1 n=15 r=. r=. r=. Network topology n=15 r=.15 n=3 r=.15 % 1% % 3% 4% 5% 6% 7% 8% 9% Delay probability Figure 11: Standard OLSR flooding with delayed TC message retransmissions. Figure 11 depits the results of ten thousand simulations, with different network definition parameters and delay probabilities. The flooding proess is onsidered to fail when, at least, one network node does not reeive the message. As expeted, an inrease in the probability of message delay produes an inrease in the number of networks for whih the flooding mehanism fails. We, therefore, onlude that if the physial medium of the network an produe this kind of transmission artifats, the use of the soure dependent flooding strategy used by the OLSR protool must ontain message aknowledgments or other protetion tehniques in order to assure that all the information is properly flooded Forwarding evaluation for eah flooding method The following series of simulations ompare the number of forward nodes when using the different flooding proedures. In all the simulations, n nodes are randomly plaed in a unit square area. If a node beomes isolated from all the remaining nodes and disonneted from the soure of the flooding, it is ignored. All the nodes have the same ommuniation range (denoted here as r). Bidiretional links between eah pair of nodes loser than r are available. The soure of the flooding is always the node with identifier. The simulations evaluate the flooding method of the standard OLSR protool (f. Proedure ), the Figure 1: Forwarding evaluation for eah flooding method (with m vg = 1). The following series of simulations ontinue the evaluation of the flooding methods when the MPR overage parameter inreases up to a fator of four. We reall that none of the methods an guarantee that the required MPR overage fator settled with values greater than one Method MPR overage Cost ratio MPR flooding [4] 1 35% Adjih et al. [1] 1 41% Wu et al. [14, 15] 1 37% Our proposal 1 1% MPR flooding [4] 56% Adjih et al. [1] 58% Wu et al. [14, 15] 54% Our proposal 35% MPR flooding [4] 3 68% Adjih et al. [1] 3 69% Wu et al. [14, 15] 3 65% Our proposal 3 45% MPR flooding [4] 4 73% Adjih et al. [1] 4 75% Wu et al. [14, 15] 4 71% Our proposal 4 5% Table : Forwarding evaluation for eah flooding method. 8

9 will be handled by all the nodes. Table summarizes the omplete series results. The ost riteria that we take into aount is the amount of forwarded messages that are generated for every method, normalized by the network size (denoted in Table as Cost ratio). Observe that in all four ases, our proposed method turns on a number of retransmissions that is muh smaller than all the other flooding methods Distane-enable MPR flooding with partial knowledge Most of the surveyed flooding proedures use only loal information about the network, i.e., the nodes need to know only their neighbors at one or two-hop distane. Some other methods need a global network overview, like all link-state protools. The input of these proesses is the link information database. This database an be omplete or partial. Inomplete link database means a partial knowledge of N d (x) whih redues the quality of the method. The amount of information whih a node stores about network links depends on the network protool. The usual situations are as follows: All nodes know all links. In protools like OLSR, only the MPRs do forward the topology ontrol (TC) messages. This means that only links from/to a node and their seleted MPRs are known by any node. MPR nodes broadast link information about all their neighbors, not only about the ones whih seleted them as MPRs. This option does not inrease the number of ontrol messages, only their size. When using our proposed method, it is relevant to measure how the different amount of TC information available at eah node affets the performane of the flooding proedure. Figure 13 shows how the differenes in the amount of available information affet the number of forwarders. Several networks with different sizes (denoted as n) and ommuniation ranges (denoted as r) are evaluated. Number of forwards n= r=.3 n=4 r=.3 n=5 r=. n=1 r=. Network topology n=15 r=. Complete MPRs N 1 of MPRs n=15 r=.15 Figure 13: Number of forwards when link database is not omplete. n=3 r=.15 Note that knowledge of full network information or knowledge of only MPR neighbors (muh better in the amount of ontrol messages) has a very similar performane in the flooding. In addition, a minimal OLSR ompliant network where nodes know only the links from MPR seletors to MPRs have a penalty of about 5% more forwards and the number of forwarders is, almost, the average between the optimal ase and the standard OLSR method. 6. Conlusion We have analyzed the formal desription of the MPR subset problem defined in the OLSR protool. We have presented some relevant methods for solving this problem, as well as some existing methods based on the MPR onept to perform an optimized flooding of messages over OLSR-based systems. We have then proposed a new flooding mehanism for suh systems. Simulations show that our proposal improves the performane of previous existing solutions. Indeed, it provides remarkable results, sine it signifiantly dereases the use of network resoures when flooding broadast messages over the system. Full adaptation of our proposal in some similar protools, taking into aount their intrinsi differenes and limitations, is a next step in our researh to onfirm the benefits of the approah that we have reported. Aknowledgments This work is partially supported by the Spanish Ministry of Siene and Innovation and the FEDER funds under the grants CONSOLIDER- INGENIO 1 CSD7-4 ARES and TSI C3-3 E-AEGIS, and the Institut TELECOM (programme Futurs et ruptures). Referenes [1] C. Adjih, P. Jaquet, and L. Viennot. Computing Conneted Dominated Sets with Multipoint Relays. Ad Ho & Sensor Wireless Networks, Marh 5. [] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayiri. Wireless Sensor Networks: A Survey IEEE Computers Networks, 38(4):393 4,. [3] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayiri, A survey on sensor networks IEEE Communiations Magazine, 4(8):1 114,. [4] T. Clausen and P. Jaquet. Optimized Link State Routing Protool (OLSR) IETF RFC 366, Otober 3. [5] G. Călinesu, I. I. Măndoiu, P. J. Wan, A. Z. Zelikovsky. Seleting forwarding neighbors in wireless ad ho networksmisbehaviors detetion to ensure availability on OLSR. Mobile Networks and Appliations, 9():11 111, 4. [6] Institut National de Reherhe en Informatique et en Automatique (IN- RIA). The Caml Language. [7] F. Cuppens, N. Cuppens-Boulahia, T. Ramard and J. Thomas. Misbehaviors detetion to ensure availability on OLSR LNCS 4864, pages , 7. [8] J. Harri, C. Bonnet, and F. Filali. OLSR and MPR: Mutual Dependenes and Performanes. Researh report RR-5-138, Institut Euréom, Marh 5. [9] U. Herberg and T. Clausen. Seurity Issues in the Optimized Link State Routing Protool Version (OLSRv). International Journal of Network Seurity & Its Appliations (IJNSA), ():16 181, April 1. [1] U. Herberg. Performane Evaluation of using a Dynami Shortest Path Algorithm in OLSRv. 8th Annual Communiation Networks and Servies Researh (CNSR), pp , IEEE Communiations Soiety, Canada, May 1. [11] A. Qayyum, L. Viennot, and A. Laouiti. Multipoint Relays for Flooding Bradast Messages in Mobile Wireless Networks. In: 35th annual Hawaii international onferene on system sienes,. [1] K. Sohrabi, J. Gao, V. Ailawadhi, and G. Pottie. Protools for selforganization of a wireless sensor network IEEE Personal Communiations, 7(5):16 7, Ot. [13] L. Vinent. Graphs and mathematial morphology. Signal Proessing, 16(4): , Elsevier, [14] J. Wu. An Enhaned Approah to Determine a Small Forward Node Set on Multipoint Relays. IEEE Vehiular Tehnology Conferene, 3. [15] J. Wu, W. Lou, and F. Dai. Extended Multipoint Relays to Determine Conneted Dominating Sets in MANETs IEEE Trans. On Computers, vol.55, 6. 9

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2 On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,

More information

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and

More information

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali

More information

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless

More information

Exploring the Commonality in Feature Modeling Notations

Exploring the Commonality in Feature Modeling Notations Exploring the Commonality in Feature Modeling Notations Miloslav ŠÍPKA Slovak University of Tehnology Faulty of Informatis and Information Tehnologies Ilkovičova 3, 842 16 Bratislava, Slovakia miloslav.sipka@gmail.om

More information

Gray Codes for Reflectable Languages

Gray Codes for Reflectable Languages Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings

More information

CleanUp: Improving Quadrilateral Finite Element Meshes

CleanUp: Improving Quadrilateral Finite Element Meshes CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)

More information

Acoustic Links. Maximizing Channel Utilization for Underwater

Acoustic Links. Maximizing Channel Utilization for Underwater Maximizing Channel Utilization for Underwater Aousti Links Albert F Hairris III Davide G. B. Meneghetti Adihele Zorzi Department of Information Engineering University of Padova, Italy Email: {harris,davide.meneghetti,zorzi}@dei.unipd.it

More information

Pipelined Multipliers for Reconfigurable Hardware

Pipelined Multipliers for Reconfigurable Hardware Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,

More information

Accommodations of QoS DiffServ Over IP and MPLS Networks

Accommodations of QoS DiffServ Over IP and MPLS Networks Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering

More information

A Novel Validity Index for Determination of the Optimal Number of Clusters

A Novel Validity Index for Determination of the Optimal Number of Clusters IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers

More information

Multi-Channel Wireless Networks: Capacity and Protocols

Multi-Channel Wireless Networks: Capacity and Protocols Multi-Channel Wireless Networks: Capaity and Protools Tehnial Report April 2005 Pradeep Kyasanur Dept. of Computer Siene, and Coordinated Siene Laboratory, University of Illinois at Urbana-Champaign Email:

More information

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communiations 1 RAC 2 E: Novel Rendezvous Protool for Asynhronous Cognitive Radios in Cooperative Environments Valentina Pavlovska,

More information

Routing Protocols for Wireless Ad Hoc Networks Hybrid routing protocols Theofanis Kilinkaridis

Routing Protocols for Wireless Ad Hoc Networks Hybrid routing protocols Theofanis Kilinkaridis Routing Protools for Wireless Ad Ho Networks Hyrid routing protools Theofanis Kilinkaridis tkilinka@.hut.fi Astrat This paper presents a partiular group of routing protools that aim to omine the advantages

More information

Outline: Software Design

Outline: Software Design Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling

More information

Multi-hop Fast Conflict Resolution Algorithm for Ad Hoc Networks

Multi-hop Fast Conflict Resolution Algorithm for Ad Hoc Networks Multi-hop Fast Conflit Resolution Algorithm for Ad Ho Networks Shengwei Wang 1, Jun Liu 2,*, Wei Cai 2, Minghao Yin 2, Lingyun Zhou 2, and Hui Hao 3 1 Power Emergeny Center, Sihuan Eletri Power Corporation,

More information

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Ho Wireless Networks Giorgio Quer, Federio Librino, Lua Canzian, Leonardo Badia, Mihele Zorzi, University of California San Diego La

More information

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion

More information

13.1 Numerical Evaluation of Integrals Over One Dimension

13.1 Numerical Evaluation of Integrals Over One Dimension 13.1 Numerial Evaluation of Integrals Over One Dimension A. Purpose This olletion of subprograms estimates the value of the integral b a f(x) dx where the integrand f(x) and the limits a and b are supplied

More information

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification erformane Improvement of TC on Wireless Cellular Networks by Adaptive Combined with Expliit Loss tifiation Masahiro Miyoshi, Masashi Sugano, Masayuki Murata Department of Infomatis and Mathematial Siene,

More information

Detection and Recognition of Non-Occluded Objects using Signature Map

Detection and Recognition of Non-Occluded Objects using Signature Map 6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,

More information

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks 62 Uplink Channel Alloation Sheme and QoS Management Mehanism for Cognitive Cellular- Femtoell Networks Kien Du Nguyen 1, Hoang Nam Nguyen 1, Hiroaki Morino 2 and Iwao Sasase 3 1 University of Engineering

More information

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr

More information

Approximate logic synthesis for error tolerant applications

Approximate logic synthesis for error tolerant applications Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu

More information

Extracting Partition Statistics from Semistructured Data

Extracting Partition Statistics from Semistructured Data Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk

More information

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425) Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University

More information

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department

More information

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1. Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,

More information

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks A Dual-Hamiltonian-Path-Based Multiasting Strategy for Wormhole-Routed Star Graph Interonnetion Networks Nen-Chung Wang Department of Information and Communiation Engineering Chaoyang University of Tehnology,

More information

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The

More information

Cluster-based Cooperative Communication with Network Coding in Wireless Networks

Cluster-based Cooperative Communication with Network Coding in Wireless Networks Cluster-based Cooperative Communiation with Network Coding in Wireless Networks Zygmunt J. Haas Shool of Eletrial and Computer Engineering Cornell University Ithaa, NY 4850, U.S.A. Email: haas@ee.ornell.edu

More information

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index IJCSES International Journal of Computer Sienes and Engineering Systems, ol., No.4, Otober 2007 CSES International 2007 ISSN 0973-4406 253 An Optimized Approah on Applying Geneti Algorithm to Adaptive

More information

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based

More information

New Channel Allocation Techniques for Power Efficient WiFi Networks

New Channel Allocation Techniques for Power Efficient WiFi Networks ew Channel Alloation Tehniques for Power Effiient WiFi etworks V. Miliotis, A. Apostolaras, T. Korakis, Z. Tao and L. Tassiulas Computer & Communiations Engineering Dept. University of Thessaly Centre

More information

A {k, n}-secret Sharing Scheme for Color Images

A {k, n}-secret Sharing Scheme for Color Images A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University

More information

Batch Auditing for Multiclient Data in Multicloud Storage

Batch Auditing for Multiclient Data in Multicloud Storage Advaned Siene and Tehnology Letters, pp.67-73 http://dx.doi.org/0.4257/astl.204.50. Bath Auditing for Multilient Data in Multiloud Storage Zhihua Xia, Xinhui Wang, Xingming Sun, Yafeng Zhu, Peng Ji and

More information

HEXA: Compact Data Structures for Faster Packet Processing

HEXA: Compact Data Structures for Faster Packet Processing Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for

More information

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and

More information

An Efficient and Scalable Approach to CNN Queries in a Road Network

An Efficient and Scalable Approach to CNN Queries in a Road Network An Effiient and Salable Approah to CNN Queries in a Road Network Hyung-Ju Cho Chin-Wan Chung Dept. of Eletrial Engineering & Computer Siene Korea Advaned Institute of Siene and Tehnology 373- Kusong-dong,

More information

Gradient based progressive probabilistic Hough transform

Gradient based progressive probabilistic Hough transform Gradient based progressive probabilisti Hough transform C.Galambos, J.Kittler and J.Matas Abstrat: The authors look at the benefits of exploiting gradient information to enhane the progressive probabilisti

More information

A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks

A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks International Journal of Computer Theory and Engineering, Vol. 5, No. 2, April 213 A Multi-Head Clustering Algorithm in Vehiular Ad Ho Networks Shou-Chih Lo, Yi-Jen Lin, and Jhih-Siao Gao Abstrat Clustering

More information

Alleviating DFT cost using testability driven HLS

Alleviating DFT cost using testability driven HLS Alleviating DFT ost using testability driven HLS M.L.Flottes, R.Pires, B.Rouzeyre Laboratoire d Informatique, de Robotique et de Miroéletronique de Montpellier, U.M. CNRS 5506 6 rue Ada, 34392 Montpellier

More information

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer

More information

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments Establishing Seure Ethernet LANs Using Intelligent Swithing Hubs in Internet Environments WOEIJIUNN TSAUR AND SHIJINN HORNG Department of Eletrial Engineering, National Taiwan University of Siene and Tehnology,

More information

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University

More information

Weak Dependence on Initialization in Mixture of Linear Regressions

Weak Dependence on Initialization in Mixture of Linear Regressions Proeedings of the International MultiConferene of Engineers and Computer Sientists 8 Vol I IMECS 8, Marh -6, 8, Hong Kong Weak Dependene on Initialization in Mixture of Linear Regressions Ryohei Nakano

More information

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes Deteting Outliers in High-Dimensional Datasets with Mixed Attributes A. Koufakou, M. Georgiopoulos, and G.C. Anagnostopoulos 2 Shool of EECS, University of Central Florida, Orlando, FL, USA 2 Dept. of

More information

Episode 12: TCP/IP & UbiComp

Episode 12: TCP/IP & UbiComp Episode 12: TCP/IP & UbiComp Hannes Frey and Peter Sturm University of Trier Outline Introdution Mobile IP TCP and Mobility Conlusion Referenes [1] James D. Solomon, Mobile IP: The Unplugged, Prentie Hall,

More information

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis

More information

Facility Location: Distributed Approximation

Facility Location: Distributed Approximation Faility Loation: Distributed Approximation Thomas Mosibroda Roger Wattenhofer Distributed Computing Group PODC 2005 Where to plae ahes in the Internet? A distributed appliation that has to dynamially plae

More information

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays nalysis of input and output onfigurations for use in four-valued D programmable logi arrays J.T. utler H.G. Kerkhoff ndexing terms: Logi, iruit theory and design, harge-oupled devies bstrat: s in binary,

More information

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION Ken Sauer and Charles A. Bouman Department of Eletrial Engineering, University of Notre Dame Notre Dame, IN 46556, (219) 631-6999 Shool of

More information

1. The collection of the vowels in the word probability. 2. The collection of real numbers that satisfy the equation x 9 = 0.

1. The collection of the vowels in the word probability. 2. The collection of real numbers that satisfy the equation x 9 = 0. C HPTER 1 SETS I. DEFINITION OF SET We begin our study of probability with the disussion of the basi onept of set. We assume that there is a ommon understanding of what is meant by the notion of a olletion

More information

DoS-Resistant Broadcast Authentication Protocol with Low End-to-end Delay

DoS-Resistant Broadcast Authentication Protocol with Low End-to-end Delay DoS-Resistant Broadast Authentiation Protool with Low End-to-end Delay Ying Huang, Wenbo He and Klara Nahrstedt {huang, wenbohe, klara}@s.uiu.edu Department of Computer Siene University of Illinois at

More information

Computing Pool: a Simplified and Practical Computational Grid Model

Computing Pool: a Simplified and Practical Computational Grid Model Computing Pool: a Simplified and Pratial Computational Grid Model Peng Liu, Yao Shi, San-li Li Institute of High Performane Computing, Department of Computer Siene and Tehnology, Tsinghua University, Beijing,

More information

A Hybrid Neuro-Genetic Approach to Short-Term Traffic Volume Prediction

A Hybrid Neuro-Genetic Approach to Short-Term Traffic Volume Prediction A Hybrid Neuro-Geneti Approah to Short-Term Traffi Volume Predition 1. Introdution Shahriar Afandizadeh 1,*, Jalil Kianfar 2 Reeived: January 2003, Revised: July 2008, Aepted: January 2009 Abstrat: This

More information

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method 3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr

More information

Cluster-Based Cumulative Ensembles

Cluster-Based Cumulative Ensembles Cluster-Based Cumulative Ensembles Hanan G. Ayad and Mohamed S. Kamel Pattern Analysis and Mahine Intelligene Lab, Eletrial and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1,

More information

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq Volume 4 Issue 6 June 014 ISSN: 77 18X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om Medial Image Compression using

More information

Colouring contact graphs of squares and rectilinear polygons de Berg, M.T.; Markovic, A.; Woeginger, G.

Colouring contact graphs of squares and rectilinear polygons de Berg, M.T.; Markovic, A.; Woeginger, G. Colouring ontat graphs of squares and retilinear polygons de Berg, M.T.; Markovi, A.; Woeginger, G. Published in: nd European Workshop on Computational Geometry (EuroCG 06), 0 Marh - April, Lugano, Switzerland

More information

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints Smooth Trajetory Planning Along Bezier Curve for Mobile Robots with Veloity Constraints Gil Jin Yang and Byoung Wook Choi Department of Eletrial and Information Engineering Seoul National University of

More information

Partial Character Decoding for Improved Regular Expression Matching in FPGAs

Partial Character Decoding for Improved Regular Expression Matching in FPGAs Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia

More information

Using Augmented Measurements to Improve the Convergence of ICP

Using Augmented Measurements to Improve the Convergence of ICP Using Augmented Measurements to Improve the onvergene of IP Jaopo Serafin, Giorgio Grisetti Dept. of omputer, ontrol and Management Engineering, Sapienza University of Rome, Via Ariosto 25, I-0085, Rome,

More information

Improved Circuit-to-CNF Transformation for SAT-based ATPG

Improved Circuit-to-CNF Transformation for SAT-based ATPG Improved Ciruit-to-CNF Transformation for SAT-based ATPG Daniel Tille 1 René Krenz-Bååth 2 Juergen Shloeffel 2 Rolf Drehsler 1 1 Institute of Computer Siene, University of Bremen, 28359 Bremen, Germany

More information

Model Based Approach for Content Based Image Retrievals Based on Fusion and Relevancy Methodology

Model Based Approach for Content Based Image Retrievals Based on Fusion and Relevancy Methodology The International Arab Journal of Information Tehnology, Vol. 12, No. 6, November 15 519 Model Based Approah for Content Based Image Retrievals Based on Fusion and Relevany Methodology Telu Venkata Madhusudhanarao

More information

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections SVC-DASH-M: Salable Video Coding Dynami Adaptive Streaming Over HTTP Using Multiple Connetions Samar Ibrahim, Ahmed H. Zahran and Mahmoud H. Ismail Department of Eletronis and Eletrial Communiations, Faulty

More information

The Happy Ending Problem

The Happy Ending Problem The Happy Ending Problem Neeldhara Misra STATUTORY WARNING This doument is a draft version 1 Introdution The Happy Ending problem first manifested itself on a typial wintery evening in 1933 These evenings

More information

1. Introduction. 2. The Probable Stope Algorithm

1. Introduction. 2. The Probable Stope Algorithm 1. Introdution Optimization in underground mine design has reeived less attention than that in open pit mines. This is mostly due to the diversity o underground mining methods and omplexity o underground

More information

- 1 - S 21. Directory-based Administration of Virtual Private Networks: Policy & Configuration. Charles A Kunzinger.

- 1 - S 21. Directory-based Administration of Virtual Private Networks: Policy & Configuration. Charles A Kunzinger. - 1 - S 21 Diretory-based Administration of Virtual Private Networks: Poliy & Configuration Charles A Kunzinger kunzinge@us.ibm.om - 2 - Clik here Agenda to type page title What is a VPN? What is VPN Poliy?

More information

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization Self-Adaptive Parent to Mean-Centri Reombination for Real-Parameter Optimization Kalyanmoy Deb and Himanshu Jain Department of Mehanial Engineering Indian Institute of Tehnology Kanpur Kanpur, PIN 86 {deb,hjain}@iitk.a.in

More information

CA Test Data Manager 4.x Implementation Proven Professional Exam (CAT-681) Study Guide Version 1.0

CA Test Data Manager 4.x Implementation Proven Professional Exam (CAT-681) Study Guide Version 1.0 Implementation Proven Professional Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer

More information

Cooperative Coverage Extension for Relay-Union Networks

Cooperative Coverage Extension for Relay-Union Networks 1.119/TPDS.214.23821, IEEE Transations on Parallel and Distributed Systems IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 1 Cooperative Coverage Extension for Relay-Union Networks Yong Cui, Xiao

More information

mahines. HBSP enhanes the appliability of the BSP model by inorporating parameters that reet the relative speeds of the heterogeneous omputing omponen

mahines. HBSP enhanes the appliability of the BSP model by inorporating parameters that reet the relative speeds of the heterogeneous omputing omponen The Heterogeneous Bulk Synhronous Parallel Model Tiani L. Williams and Rebea J. Parsons Shool of Computer Siene University of Central Florida Orlando, FL 32816-2362 fwilliams,rebeag@s.uf.edu Abstrat. Trends

More information

Boosted Random Forest

Boosted Random Forest Boosted Random Forest Yohei Mishina, Masamitsu suhiya and Hironobu Fujiyoshi Department of Computer Siene, Chubu University, 1200 Matsumoto-ho, Kasugai, Aihi, Japan {mishi, mtdoll}@vision.s.hubu.a.jp,

More information

Definitions Homework. Quine McCluskey Optimal solutions are possible for some large functions Espresso heuristic. Definitions Homework

Definitions Homework. Quine McCluskey Optimal solutions are possible for some large functions Espresso heuristic. Definitions Homework EECS 33 There be Dragons here http://ziyang.ees.northwestern.edu/ees33/ Teaher: Offie: Email: Phone: L477 Teh dikrp@northwestern.edu 847 467 2298 Today s material might at first appear diffiult Perhaps

More information

Intra- and Inter-Stream Synchronisation for Stored Multimedia Streams

Intra- and Inter-Stream Synchronisation for Stored Multimedia Streams IEEE International Conferene on Multimedia Computing & Systems, June 17-23, 1996, in Hiroshima, Japan, p 372-381 Intra- and Inter-Stream Synhronisation for Stored Multimedia Streams Ernst Biersak, Werner

More information

KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION

KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION Cuiui Kang 1, Shengai Liao, Shiming Xiang 1, Chunhong Pan 1 1 National Laboratory of Pattern Reognition, Institute of Automation, Chinese

More information

Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introduction Information Retrieval... 8

Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introduction Information Retrieval... 8 Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introdution... 1 1.1. Internet Information...2 1.2. Internet Information Retrieval...3 1.2.1. Doument Indexing...4 1.2.2. Doument Retrieval...4

More information

Displacement-based Route Update Strategies for Proactive Routing Protocols in Mobile Ad Hoc Networks

Displacement-based Route Update Strategies for Proactive Routing Protocols in Mobile Ad Hoc Networks Displaement-based Route Update Strategies for Proative Routing Protools in Mobile Ad Ho Networks Mehran Abolhasan 1 and Tadeusz Wysoki 1 1 University of Wollongong, NSW 2522, Australia E-mail: mehran@titr.uow.edu.au,

More information

Constructing Transaction Serialization Order for Incremental. Data Warehouse Refresh. Ming-Ling Lo and Hui-I Hsiao. IBM T. J. Watson Research Center

Constructing Transaction Serialization Order for Incremental. Data Warehouse Refresh. Ming-Ling Lo and Hui-I Hsiao. IBM T. J. Watson Research Center Construting Transation Serialization Order for Inremental Data Warehouse Refresh Ming-Ling Lo and Hui-I Hsiao IBM T. J. Watson Researh Center July 11, 1997 Abstrat In typial pratie of data warehouse, the

More information

A Dictionary based Efficient Text Compression Technique using Replacement Strategy

A Dictionary based Efficient Text Compression Technique using Replacement Strategy A based Effiient Text Compression Tehnique using Replaement Strategy Debashis Chakraborty Assistant Professor, Department of CSE, St. Thomas College of Engineering and Tehnology, Kolkata, 700023, India

More information

An Interactive-Voting Based Map Matching Algorithm

An Interactive-Voting Based Map Matching Algorithm Eleventh International Conferene on Mobile Data Management An Interative-Voting Based Map Mathing Algorithm Jing Yuan* University of Siene and Tehnology of China Hefei, China yuanjing@mail.ust.edu.n Yu

More information

XML Data Streams. XML Stream Processing. XML Stream Processing. Yanlei Diao. University of Massachusetts Amherst

XML Data Streams. XML Stream Processing. XML Stream Processing. Yanlei Diao. University of Massachusetts Amherst XML Stream Proessing Yanlei Diao University of Massahusetts Amherst XML Data Streams XML is the wire format for data exhanged online. Purhase orders http://www.oasis-open.org/ommittees/t_home.php?wg_abbrev=ubl

More information

Chapter 2: Introduction to Maple V

Chapter 2: Introduction to Maple V Chapter 2: Introdution to Maple V 2-1 Working with Maple Worksheets Try It! (p. 15) Start a Maple session with an empty worksheet. The name of the worksheet should be Untitled (1). Use one of the standard

More information

Recommendation Subgraphs for Web Discovery

Recommendation Subgraphs for Web Discovery Reommation Subgraphs for Web Disovery Arda Antikaioglu Department of Mathematis Carnegie Mellon University aantika@andrew.mu.edu R. Ravi Tepper Shool of Business Carnegie Mellon University ravi@mu.edu

More information

Drawing lines. Naïve line drawing algorithm. drawpixel(x, round(y)); double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx; double y = y0;

Drawing lines. Naïve line drawing algorithm. drawpixel(x, round(y)); double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx; double y = y0; Naïve line drawing algorithm // Connet to grid points(x0,y0) and // (x1,y1) by a line. void drawline(int x0, int y0, int x1, int y1) { int x; double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx;

More information

We don t need no generation - a practical approach to sliding window RLNC

We don t need no generation - a practical approach to sliding window RLNC We don t need no generation - a pratial approah to sliding window RLNC Simon Wunderlih, Frank Gabriel, Sreekrishna Pandi, Frank H.P. Fitzek Deutshe Telekom Chair of Communiation Networks, TU Dresden, Dresden,

More information

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,

More information

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Arne Hamann, Razvan Rau, Rolf Ernst Institute of Computer and Communiation Network Engineering Tehnial University of Braunshweig,

More information

The Implementation of RRTs for a Remote-Controlled Mobile Robot

The Implementation of RRTs for a Remote-Controlled Mobile Robot ICCAS5 June -5, KINEX, Gyeonggi-Do, Korea he Implementation of RRs for a Remote-Controlled Mobile Robot Chi-Won Roh*, Woo-Sub Lee **, Sung-Chul Kang *** and Kwang-Won Lee **** * Intelligent Robotis Researh

More information

Network Coding in Wireless Networks with Random Access

Network Coding in Wireless Networks with Random Access ISIT2007, Nie, Frane, June 24 - June 29, 200O Network Coding in Wireless Networks with Random Aess Danail Traskovt, Desmond S. Lun, Ralf Koettert, and Muriel Medardt Broad Institute MIT and Harvard Cambridge,

More information

COMBINATION OF INTERSECTION- AND SWEPT-BASED METHODS FOR SINGLE-MATERIAL REMAP

COMBINATION OF INTERSECTION- AND SWEPT-BASED METHODS FOR SINGLE-MATERIAL REMAP Combination of intersetion- and swept-based methods for single-material remap 11th World Congress on Computational Mehanis WCCM XI) 5th European Conferene on Computational Mehanis ECCM V) 6th European

More information

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient

More information

Incremental Mining of Partial Periodic Patterns in Time-series Databases

Incremental Mining of Partial Periodic Patterns in Time-series Databases CERIAS Teh Report 2000-03 Inremental Mining of Partial Periodi Patterns in Time-series Dataases Mohamed G. Elfeky Center for Eduation and Researh in Information Assurane and Seurity Purdue University,

More information

Graph-Based vs Depth-Based Data Representation for Multiview Images

Graph-Based vs Depth-Based Data Representation for Multiview Images Graph-Based vs Depth-Based Data Representation for Multiview Images Thomas Maugey, Antonio Ortega, Pasal Frossard Signal Proessing Laboratory (LTS), Eole Polytehnique Fédérale de Lausanne (EPFL) Email:

More information

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah

More information

A Comparison of Hard-state and Soft-state Signaling Protocols

A Comparison of Hard-state and Soft-state Signaling Protocols University of Massahusetts Amherst SholarWorks@UMass Amherst Computer Siene Department Faulty Publiation Series Computer Siene 2003 A Comparison of Hard-state and Soft-state Signaling Protools Ping Ji

More information

Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks

Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks Crowd-GPS-Se: Leveraging Crowdsouring to Detet and Loalize GPS Spoofing Attaks Kai Jansen, Matthias Shäfer, Daniel Moser, Vinent Lenders, Christina Pöpper and Jens Shmitt Ruhr-University Bohum, Germany,

More information

Introductory Programming, IMM, DTU Systematic Software Test. Software test (afprøvning) Motivation. Structural test and functional test

Introductory Programming, IMM, DTU Systematic Software Test. Software test (afprøvning) Motivation. Structural test and functional test Introdutory Programming, IMM, DTU Systemati Software Test Peter Sestoft a Programs often ontain unintended errors how do you find them? Strutural test Funtional test Notes: Systemati Software Test, http://www.dina.kvl.dk/

More information

Dynamic Backlight Adaptation for Low Power Handheld Devices 1

Dynamic Backlight Adaptation for Low Power Handheld Devices 1 Dynami Baklight Adaptation for ow Power Handheld Devies 1 Sudeep Pasriha, Manev uthra, Shivajit Mohapatra, Nikil Dutt and Nalini Venkatasubramanian 444, Computer Siene Building, Shool of Information &

More information