Lecture 14: Managing Mobility. Rik Sarkar
|
|
- Jessie Henderson
- 8 years ago
- Views:
Transcription
1 Lecture 14: Managing Mobility Rik Sarkar
2 Communica9on with mobile nodes How do cell phones work? How can we talk to mobile nodes without the cell infrastructure?
3 How do mobile phones work? There are large wireless antennas (Base sta9on) The base sta9ons are connected to each other by high speed wired network A mobile phone connects to the nearest base sta9on, and uses that to communicate with rest of network Each base sta9on maintains a list of cell phones in its region, and their ongoing calls and communica9ons
4 What happens cell phone moves Suppose it moves away from base sta9on A and close to base sta9on B Then A sends all informa9on relevant to the mobile phone to B, so that B can con9nue all the data/voice communica9on without interrup9on
5 Loca9on maintenance Suppose we wish to make a call to cell phone c. We need to know the base sta9on B that is currently servicing c s communica9ons How do cell phones find this out? Each cell phone has a home region determined by its phone number For example, a phone with a Berlin number has home in Berlin. Whenever it moves to a new loca9on, it informs the home sta9on about its current loca9on
6 Star9ng a call to a moving phone Suppose phone c is currently in Frankfurt A call to c first goes to Berlin Berlin redirects the call to Frankfurt Suppose c moves to a neighborhood of Frankfurt: It s9ll has to update Berlin : long communica9on A call may come in before the update has completed Solu9on: Phone c also leaves a pointer at Frankfurt A call coming to Frankfurt gets forwarded Small moves do not need to be updated to Berlin
7 Can we work without home bases? Home bases may fail Home can be a bozleneck May cost a lot of communica9on on updates Can we do coordinate based greedy rou9ng for mobile devices?
8 Methods we have already seen Use Geographic Hash Tables (GHT) Essen9ally the Home base scheme Use double rulings Each node is a producer, stores data on a producer curve Too expensive each update costs sqrt(n)
9 Papers Baruch Awerbuch, David Peleg. Concurrent online tracking of mobile users, SIGCOMM'91 Jinyang Li, John Jannoa, Douglas S. J. De Couto, David R. Karger and Robert Morris, A scalable loca5on service for geographic ad hoc rou5ng, MobiCom'00
10 Communica9ng with mobile users Move opera9on Update the system when a node moves Find opera9on Find a user loca9on to ini9ate communica9on Must be distance sensi9ve Update should have small cost on moving to nearby loca9on Find should have a small cost when searching for nearby users Local moves and queries are common
11 Model Graph G (like the wired network of base sta9ons) Weight w(e) for each edge e dist(u,v): length of shortest path Diameter D(G) max distance between any pair of nodes addr(x): Current loca9on of node x Assume we have a rou9ng method on G
12 Distributed loca9on informa9on Store pointers to loca9ons of each user in various nodes Update these as users move Allow some pointers to be inaccurate Pointers at nearby loca9ons should be accurate: updated frequently Pointers at far away loca9ons can be updated less oden
13 Hierarchichal pointers There are directory servers at different distances that store these pointers A level i directory server stores loca9ons of nodes within distance 2 i Each node stores a pointer at a directory server at each level i
14 Forwarding When a user x moves, update the directory servers at all levels: farthest is at about D If node has moved a distance d, update upto log d lowest levels, leave pointers Addresses are up to date at lower levels : for local communica9ons Low communica9on costs
15
16 Forwarding pointers Server at level 1 always has the right address The server at level i stores a pointer to a server at i- 1 Therefore, node is always reachable Problem: may be a long chain of pointers
17 Upda9ng addresses Keep a counter c i (x) : Distance moved since last update to level I When c i (x) exceeds 2 i- 1, update directories at all levels upto i : Remove all old entries Create new entries upto level i
18 Finding a mobile user Check servers at increasing levels 1,2,3.. Will find within distance 2 i when checking server at level i Next: What if there are no sta9c nodes to serve as servers? What if all nodes are mobile?
19 GLS: Grid Loca9on Service Each node is assigned a random id from a circular set Store loca9on at more nearby servers, fewer far away servers
20 Recursive par99oning: Each node belongs to a unique square at each level. A level i square contains exactly 4 squares of level i- 1 Quadtree
21 Loca9on Servers for node B Inside each sibling square on each level, choose B s closest node: Node with least id ader B
22 Loca9on query A wants to find B A only knows B s id Neither A or B knows B s loca9on servers
23 Loca9on query A has the loca9on of some other nodes Send request to one closest to B That node repeats Guaranteed to reach B!
24 Loca9on query A has the loca9on of some other nodes Send request to one closest to B That node repeats Guaranteed to reach B!
25 Loca9on query Suppose 21 is B s closest node in A s level 2 square: no node in in this square Suppose X in range in A s level 2 sibling square 21 has informa9on of all nodes in in level 2 sibling square including the one closest to 17 (B) X
26 Loca9on query Query always goes to B s closest node at the next level Finally finds a node that has B s loca9on X
27 Update loca9on servers A can update loca9on server without knowing it A routes to a square S with geographic rou9ng First node in performs a loca9on query for A Query will go to node closest to A This is A s loca9on server! Update it! X
28 Ini9aliza9on Level 1 square exchange en9re informa9on Update loca9on servers Then loca9on servers can be built with the update protocol X
29 Summary Solves loca9on problem using geographic rou9ng Distance sensi9ve Completely distributed: everyone is a server Works with complete mobility, since server ids are not needed Worst case query cost not bounded. Nodes at nearby level 1 squares may be far in the quadtree
30 Student presenta9ons 31/1 Andreas Krause, Carlos Guestrin, Anupam Gupta, Jon Kleinberg, Near- op5mal Sensor Placements: Maximizing Informa5on while Minimizing Communica5on Cost, IPSN 06 How to place sensors to get good results Sorabh Gandhi, Subhash Suri, Emo Welzl, Catching Elephants with Mice: Sparse Sampling for Monitoring Sensor Networks, Sensys 2007 Ac9vate a few sensors such that any event large enough is detected Nisheeth Shrivastava, Subhash Suri, Csaba, Toth, Detec5ng Cuts in Sensor Networks, IPSN'05. Use a small number of sensors to detect if the network is par99oned Luiz F. M. Vieira, Uichin Lee, Mario Gerla, Phero- Trail: a Bio- inspired Loca5on Service for Mobile Underwater Sensors, WUWNet'08 Loca9on for mobile underwater 3D networks
31 Jaspreet Singh, Rajesh Kumar, Upamanyu Madhow, Subhash Suri, Richard Cagley, Tracking Mul5ple Targets Using Binary Proximity Sensors, IPSN'07
Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)
Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...
More informationLoad Balancing in Structured Overlay Networks. Tallat M. Shafaat tallat(@)kth.se
Load Balancing in Structured Overlay Networks Tallat M. Shafaat tallat(@)kth.se Overview Background The problem : load imbalance Causes of load imbalance Solutions But first, some slides from previous
More informationNodes, Ties and Influence
Nodes, Ties and Influence Chapter 2 Chapter 2, Community Detec:on and Mining in Social Media. Lei Tang and Huan Liu, Morgan & Claypool, September, 2010. 1 IMPORTANCE OF NODES 2 Importance of Nodes Not
More informationMining Social Network Graphs
Mining Social Network Graphs Debapriyo Majumdar Data Mining Fall 2014 Indian Statistical Institute Kolkata November 13, 17, 2014 Social Network No introduc+on required Really? We s7ll need to understand
More informationPrivacy- Preserving P2P Data Sharing with OneSwarm. Presented by. Adnan Malik
Privacy- Preserving P2P Data Sharing with OneSwarm Presented by Adnan Malik Privacy The protec?on of informa?on from unauthorized disclosure Centraliza?on and privacy threat Websites Facebook TwiFer Peer
More informationHierarchical Location Service for Mobile Ad-Hoc Networks
Hierarchical Location Service for Mobile Ad-Hoc Networks Wolfgang Kieß Holger Füßler Jörg Widmer kiess@cs.uni-duesseldorf.de fuessler@informatik.uni-mannheim.de joerg.widmer@epfl.ch Martin Mauve mauve@cs.uni-duesseldorf.de
More informationConsecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks
21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks Jeongcheol Lee, Euisin
More informationAn Energy Efficient Location Service for Mobile Ad Hoc Networks
An Energ Efficient Location Service for Mobile Ad Hoc Networks Zijian Wang 1, Euphan Bulut 1 and Boleslaw K. Szmanski 1, 1 Department of Computer Science, Rensselaer Poltechnic Institute, Tro, NY 12180
More informationController- based Path Selec2on for Distributed IaaS Cloud Environment. arch B4 yummy
Controller- based Path Selec2on for Distributed IaaS Cloud Environment arch B4 yummy 1 Outline of Presenta2on 1. Problems of Distributed IaaS Cloud Environment Higher latency to some des2na2ons Many unnecessary
More informationHow To Balance Network Load In A Wireless Sensor Network
Balancing Network Traffic Load in Geographic Hash Table (GHT) R. Asha, V.Manju, Meka Sindhu & T. Subha Department of Information Technology, Sri Sai Ram Engineering College, Chennai. E-mail : ashaniteesh@gmail.com,
More informationContent Distribu-on Networks (CDNs)
Content Distribu-on Networks (CDNs) Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:0am in Architecture N101 hjp://www.cs.princeton.edu/courses/archive/spr12/cos461/ Second Half of the Course
More informationPhone Systems Buyer s Guide
Phone Systems Buyer s Guide Contents How Cri(cal is Communica(on to Your Business? 3 Fundamental Issues 4 Phone Systems Basic Features 6 Features for Users with Advanced Needs 10 Key Ques(ons for All Buyers
More informationChord. A scalable peer-to-peer look-up protocol for internet applications
Chord A scalable peer-to-peer look-up protocol for internet applications by Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan Overview Introduction The Chord Algorithm Construction
More informationLocation Information Services in Mobile Ad Hoc Networks
Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent
More informationPower Efficiency Metrics for Geographical Routing In Multihop Wireless Networks
Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks Gowthami.A, Lavanya.R Abstract - A number of energy-aware routing protocols are proposed to provide the energy efficiency
More informationWireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
More informationSpontaneous Group Management in Mobile Ad Hoc Networks
Wireless Networks 10, 423 438, 2004 2004 Kluwer Academic Publishers. Manufactured in The Netherlands. Spontaneous Group Management in Mobile Ad Hoc Networks LAURA GALLUCCIO, GIACOMO MORABITO and SERGIO
More informationAn Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
More informationScalable Source Routing
Scalable Source Routing January 2010 Thomas Fuhrmann Department of Informatics, Self-Organizing Systems Group, Technical University Munich, Germany Routing in Networks You re there. I m here. Scalable
More informationProcessing of Mix- Sensi0vity Video Surveillance Streams on Hybrid Clouds
Processing of Mix- Sensi0vity Video Surveillance Streams on Hybrid Clouds Chunwang Zhang, Ee- Chien Chang School of Compu2ng, Na2onal University of Singapore 28 th June, 2014 Outline 1. Mo0va0on 2. Hybrid
More informationA Scalable Location Management Scheme in Mobile Ad-hoc Networks
Scalable Location Management Scheme in Mobile d-hoc Networks Yuan Xue Baochun Li Klara Nahrstedt bstract n ad-hoc networks, geographical routing protocols take advantage of location information so that
More informationLLS : a Locality Aware Location Service for Mobile Ad Hoc Networks
LLS : a Locality Aware Location Service for Mobile Ad Hoc Networks Ittai Abraham ittaia@cs.huji.ac.il Danny Dolev dolev@cs.huji.ac.il School of Computer Science and Engineering Hebrew University of Jerusalem
More informationNetworking and the Web
Networking and the Web World- Wide Web Wide use of computers by the general public is directly a7ributable to the crea8on of the World Wide Web Key components of the web Computer Communica8on Networks
More informationL + : Scalable Landmark Routing and Address Lookup for Multi-hop Wireless Networks
: Scalable Routing and Address Lookup for Multi-hop Wireless Networks Benjie Chen Robert Morris Laboratory for Computer Science Massachusetts Institute of Technology Cambridge, Massachusetts, 2139 {benjie,rtm}@lcs.mit.edu
More informationLecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
More informationMedial Axis Construction and Applications in 3D Wireless Sensor Networks
Medial Axis Construction and Applications in 3D Wireless Sensor Networks Su Xia, Ning Ding, Miao Jin, Hongyi Wu, and Yang Yang Presenter: Hongyi Wu University of Louisiana at Lafayette Outline Introduction
More informationCSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013
CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60
More informationInternational journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.
RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article
More informationTowards Efficient Routing in Vehicular Ad Hoc Networks
Towards Efficient Routing in Vehicular Ad Hoc Networks Moez Jerbi*, Sidi-Mohammed Senouci* and Yacine Ghamri-Doudane** *France Telecom R&D, Core Network Laboratories, Lannion, France **Networks and Multimedia
More informationWireless and Mobile Networks
Wireless and Mobile Networks Reading: Sec7ons 2.8 and 4.2.5 COS 461: Computer Networks Spring 2009 (MW 1:30 2:50 in COS 105) Mike Freedman Teaching Assistants: WyaO Lloyd and Jeff Terrace hop://www.cs.princeton.edu/courses/archive/spring09/cos461/
More informationCluster Analysis: Advanced Concepts
Cluster Analysis: Advanced Concepts and dalgorithms Dr. Hui Xiong Rutgers University Introduction to Data Mining 08/06/2006 1 Introduction to Data Mining 08/06/2006 1 Outline Prototype-based Fuzzy c-means
More informationData Mining. Cluster Analysis: Advanced Concepts and Algorithms
Data Mining Cluster Analysis: Advanced Concepts and Algorithms Tan,Steinbach, Kumar Introduction to Data Mining 4/18/2004 1 More Clustering Methods Prototype-based clustering Density-based clustering Graph-based
More informationEnergy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee Andreas Klappenecker Kyungsook Lee Lan Lin Abstract This paper proposes an energy efficient protocol for
More information{p t [D1t(p t ) + D2t(p t )]}. Proposition 1. With a dynamic centralized pricing mechanism, p cen
On Profitability and Efficiency of Wireless Mesh Networks Fang Fang, College of Business Administration, Cal State San Marcos, fangfang@csusm.edu; Lili Qiu, Department of Computer Science, The Univ of
More information1 Six Degrees of Separation
Networks: Spring 2007 The Small-World Phenomenon David Easley and Jon Kleinberg April 23, 2007 1 Six Degrees of Separation The small-world phenomenon the principle that we are all linked by short chains
More informationWell-Separated Pair Decomposition for the Unit-disk Graph Metric and its Applications
Well-Separated Pair Decomposition for the Unit-disk Graph Metric and its Applications Jie Gao Department of Computer Science Stanford University Joint work with Li Zhang Systems Research Center Hewlett-Packard
More informationMap- reduce, Hadoop and The communica3on bo5leneck. Yoav Freund UCSD / Computer Science and Engineering
Map- reduce, Hadoop and The communica3on bo5leneck Yoav Freund UCSD / Computer Science and Engineering Plan of the talk Why is Hadoop so popular? HDFS Map Reduce Word Count example using Hadoop streaming
More informationOptimized Load Balancing Mechanism Using Carry Forward Distance
Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,
More informationA Hierarchical Structure based Coverage Repair in Wireless Sensor Networks
A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks Jie Wu Computer Science & Engineering Department Florida Atlantic University Boca Raton, FL 3343, USA E-mail: jie@cse.fau.edu
More informationContact Center Rou,ng Strategies for Improving Customer Experience
Contact Center Rou,ng Strategies for Improving Customer Experience an ebook from Genesys 1 The Contact Center Reality A finite number of available associates A variable volume of contacts A limited amount
More informationDistributed systems Lecture 6: Elec3ons, consensus, and distributed transac3ons. Dr Robert N. M. Watson
Distributed systems Lecture 6: Elec3ons, consensus, and distributed transac3ons Dr Robert N. M. Watson 1 Last 3me Saw how we can build ordered mul3cast Messages between processes in a group Need to dis3nguish
More informationOn Video Content Delivery in Wireless Environments
, pp.81-85 http://dx.doi.org/10.14257/astl.2014.65.20 On Video Content Delivery in Wireless Environments Po-Jen Chuang and Hang-Li Chen Department of Electrical Engineering Tamkang University Tamsui, New
More informationDomain Name System. Heng Sovannarith heng_sovannarith@yahoo.com
Domain Name System Heng Sovannarith heng_sovannarith@yahoo.com Introduc:on to DNS Domain Name System is a distributed database system that can be serve as the founda:on for name resolu:on in a TCP/IP Network.
More informationBroadcasting in Wireless Networks
Université du Québec en Outaouais, Canada 1/46 Outline Intro Known Ad hoc GRN 1 Introduction 2 Networks with known topology 3 Ad hoc networks 4 Geometric radio networks 2/46 Outline Intro Known Ad hoc
More informationData Mining Cluster Analysis: Advanced Concepts and Algorithms. Lecture Notes for Chapter 9. Introduction to Data Mining
Data Mining Cluster Analysis: Advanced Concepts and Algorithms Lecture Notes for Chapter 9 Introduction to Data Mining by Tan, Steinbach, Kumar Tan,Steinbach, Kumar Introduction to Data Mining 4/18/2004
More informationTORA : Temporally Ordered Routing Algorithm
TORA : Temporally Ordered Routing Algorithm Invented by Vincent Park and M.Scott Corson from University of Maryland. TORA is an on-demand routing protocol. The main objective of TORA is to limit control
More informationDDC Sequencing and Redundancy
DDC Sequencing and Redundancy Presenter Sequencing Importance of sequencing Essen%al piece to designing and delivering a successful project Defines how disparate components interact to make up a system
More informationLoad Balanced Optical-Network-Unit (ONU) Placement Algorithm in Wireless-Optical Broadband Access Networks
Load Balanced Optical-Network-Unit (ONU Placement Algorithm in Wireless-Optical Broadband Access Networks Bing Li, Yejun Liu, and Lei Guo Abstract With the broadband services increasing, such as video
More informationCSE 326, Data Structures. Sample Final Exam. Problem Max Points Score 1 14 (2x7) 2 18 (3x6) 3 4 4 7 5 9 6 16 7 8 8 4 9 8 10 4 Total 92.
Name: Email ID: CSE 326, Data Structures Section: Sample Final Exam Instructions: The exam is closed book, closed notes. Unless otherwise stated, N denotes the number of elements in the data structure
More informationQUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
More informationAn Implementation of Secure Wireless Network for Avoiding Black hole Attack
An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,
More informationMonitoring Large-Scale Wireless Sensor Networks
Monitoring Large-Scale Wireless Sensor Networks using Epidemic Protocols Daniela Gavidia, Spyros Voulgaris, Maarten van Steen Vrije Universiteit Amsterdam Faculty of Science Department of Computer Science
More informationCSC2420 Fall 2012: Algorithm Design, Analysis and Theory
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin November 15, 2012; Lecture 10 1 / 27 Randomized online bipartite matching and the adwords problem. We briefly return to online algorithms
More informationAttacks on neighbor discovery
Cryptographic Protocols (EIT ICT MSc) Dr. Levente Buttyán associate professor BME Hálózati Rendszerek és Szolgáltatások Tanszék Lab of Cryptography and System Security (CrySyS) buttyan@hit.bme.hu, buttyan@crysys.hu
More information10 Steps to Preparedness
10 Steps to Preparedness Key Take- Aways Review basics of disaster recovery and con2nuity of opera2ons. Understand what you can do to prepare your pool and its members for an unplanned interrup2on. Ini2ate
More informationRetaining globally distributed high availability Art van Scheppingen Head of Database Engineering
Retaining globally distributed high availability Art van Scheppingen Head of Database Engineering Overview 1. Who is Spil Games? 2. Theory 3. Spil Storage Pla9orm 4. Ques=ons? 2 Who are we? Who is Spil
More information! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.
Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three
More informationMigrating to Hosted Telephony. Your ultimate guide to migrating from on premise to hosted telephony. www.ucandc.com
Migrating to Hosted Telephony Your ultimate guide to migrating from on premise to hosted telephony Intro What is covered in this guide? A professional and reliable business telephone system is a central
More informationChord - A Distributed Hash Table
Kurt Tutschku Vertretung - Professur Rechnernetze und verteilte Systeme Chord - A Distributed Hash Table Outline Lookup problem in Peer-to-Peer systems and Solutions Chord Algorithm Consistent Hashing
More informationEvaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network
Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Sagar M Mane Walchand Institute of Technology Solapur. India. Solapur University, Solapur. S.S.Apte Walchand Institute
More informationSeminar. Path planning using Voronoi diagrams and B-Splines. Stefano Martina stefano.martina@stud.unifi.it
Seminar Path planning using Voronoi diagrams and B-Splines Stefano Martina stefano.martina@stud.unifi.it 23 may 2016 This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International
More informationLoad Balancing Geo-routing and routing around Holes in Wireless Sensor Networks Ashwini S R 1, Dr.Nataraj K R 2 1 PG Student, DCN, SJBIT, Bangalore
Load Balancing Geo-routing and routing around Holes in Wireless Sensor Networks Ashwini S R 1, Dr.Nataraj K R 2 1 PG Student, DCN, SJBIT, Bangalore 2 Professor and HOD, SJBIT, Bangalore Email: ashwinigowda@gmail.com,
More informationSocial Media Mining. Graph Essentials
Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures
More informationScaling IP Mul-cast on Datacenter Topologies. Xiaozhou Li Mike Freedman
Scaling IP Mul-cast on Datacenter Topologies Xiaozhou Li Mike Freedman IP Mul0cast Applica0ons Publish- subscribe services Clustered applica0ons servers Distributed caching infrastructures IP Mul0cast
More informationDDOS Mi'ga'on in RedIRIS. SIG- ISM. Vienna
DDOS Mi'ga'on in RedIRIS SIG- ISM. Vienna Index Evolu'on of DDOS a:acks in RedIRIS Mi'ga'on Tools Current DDOS strategy About RedIRIS Spanish Academic & research network. Universi'es, research centers,.
More informationTelephone Related Queries (TeRQ) IETF 85 (Atlanta)
Telephone Related Queries (TeRQ) IETF 85 (Atlanta) Telephones and the Internet Our long- term goal: migrate telephone rou?ng and directory services to the Internet ENUM: Deviated significantly from its
More informationImpact Of Interference On Multi-hop Wireless Network Performance
Impact Of Interference On Multi-hop Wireless Network Performance Kamal Jain Jitendra Padhye Venkata N. Padmanabhan Lili Qiu Microsoft Research One Microsoft Way, Redmond, WA 98052. {kamalj, padhye, padmanab,
More informationTopological Properties
Advanced Computer Architecture Topological Properties Routing Distance: Number of links on route Node degree: Number of channels per node Network diameter: Longest minimum routing distance between any
More informationLecture 23: Interconnection Networks. Topics: communication latency, centralized and decentralized switches (Appendix E)
Lecture 23: Interconnection Networks Topics: communication latency, centralized and decentralized switches (Appendix E) 1 Topologies Internet topologies are not very regular they grew incrementally Supercomputers
More informationMulti-layer Structure of Data Center Based on Steiner Triple System
Journal of Computational Information Systems 9: 11 (2013) 4371 4378 Available at http://www.jofcis.com Multi-layer Structure of Data Center Based on Steiner Triple System Jianfei ZHANG 1, Zhiyi FANG 1,
More informationXiaoqiao Meng, Vasileios Pappas, Li Zhang IBM T.J. Watson Research Center Presented by: Payman Khani
Improving the Scalability of Data Center Networks with Traffic-aware Virtual Machine Placement Xiaoqiao Meng, Vasileios Pappas, Li Zhang IBM T.J. Watson Research Center Presented by: Payman Khani Overview:
More informationMulti-Robot Traffic Planning Using ACO
Multi-Robot Traffic Planning Using ACO DR. ANUPAM SHUKLA, SANYAM AGARWAL ABV-Indian Institute of Information Technology and Management, Gwalior INDIA Sanyam.iiitm@gmail.com Abstract: - Path planning is
More informationDATA COLLECTION SCHEME FOR WIRELESS SENSOR NETWORK WITH MOBILE COLLECTOR
DATA COLLECTION SCHEME FOR WIRELESS SENSOR NETWORK WITH MOBILE COLLECTOR Khaled Almi ani, Muder Almi ani, Ali Al_ghonmein and Khaldun Al-Moghrabi ABSTRACT Al-Hussein Bin Talal University, Ma an, Jordan
More informationRole of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network
International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra
More informationBig Data in Automotive Applications: Cloud Computing Based Velocity Profile Generation for Minimum Fuel Consumption
Big Data in Automotive Applications: Cloud Computing Based Velocity Profile Generation for Minimum Fuel Consumption Giorgio Rizzoni, Ümit Özgüner, Simona Onori, Jim Wollaeger, Adarsh Kumar, Pardis Khayyer,
More informationDUE to the limited spectrum, user s mobility, and power
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 6, NO. 9, SEPTEMBER 2007 1 Hop ID: A Virtual Coordinate-Based Routing for Sparse Mobile Ad Hoc Networs Yao Zhao, Yan Chen, Bo Li, and Qian Zhang Abstract Routing
More informationPlaxton Routing. - From a peer - to - peer network point of view. Lars P. Wederhake
Plaxton Routing - From a peer - to - peer network point of view Lars P. Wederhake Ferienakademie im Sarntal 2008 FAU Erlangen-Nürnberg, TU München, Uni Stuttgart September 2008 Overview 1 Introduction
More informationStudy of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
More informationComponents: Interconnect Page 1 of 18
Components: Interconnect Page 1 of 18 PE to PE interconnect: The most expensive supercomputer component Possible implementations: FULL INTERCONNECTION: The ideal Usually not attainable Each PE has a direct
More informationData Mining Cluster Analysis: Advanced Concepts and Algorithms. Lecture Notes for Chapter 9. Introduction to Data Mining
Data Mining Cluster Analysis: Advanced Concepts and Algorithms Lecture Notes for Chapter 9 Introduction to Data Mining by Tan, Steinbach, Kumar Tan,Steinbach, Kumar Introduction to Data Mining 4/18/2004
More informationDATA STRUCTURES USING C
DATA STRUCTURES USING C QUESTION BANK UNIT I 1. Define data. 2. Define Entity. 3. Define information. 4. Define Array. 5. Define data structure. 6. Give any two applications of data structures. 7. Give
More informationOn Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks
On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks Marcello Caleffi, Giancarlo Ferraiuolo, Luigi Paura Department of Electronic and Telecommunication Engineering (DIET) University
More informationPERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael
More informationTechnology White Paper Capacity Constrained Smart Grid Design
Capacity Constrained Smart Grid Design Smart Devices Smart Networks Smart Planning EDX Wireless Tel: +1-541-345-0019 I Fax: +1-541-345-8145 I info@edx.com I www.edx.com Mark Chapman and Greg Leon EDX Wireless
More informationPersistent Data Structures
6.854 Advanced Algorithms Lecture 2: September 9, 2005 Scribes: Sommer Gentry, Eddie Kohler Lecturer: David Karger Persistent Data Structures 2.1 Introduction and motivation So far, we ve seen only ephemeral
More informationLecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs
CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like
More informationData Storage Issues in Sensor Networks. Dr. Deepak Ganesan, edited by Dr. Robert Akl
Data Storage Issues in Sensor Networks Dr. Deepak Ganesan, edited by Dr. Robert Akl Spectrum of Data Management Techniques Communication for Query Processing Local Storage and Flooding or Geography-based
More informationComparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data
CMPE 59H Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data Term Project Report Fatma Güney, Kübra Kalkan 1/15/2013 Keywords: Non-linear
More information3/25/2014. 3/25/2014 Sensor Network Security (Simon S. Lam) 1
Sensor Network Security 3/25/2014 Sensor Network Security (Simon S. Lam) 1 1 References R. Blom, An optimal class of symmetric key generation systems, Advances in Cryptology: Proceedings of EUROCRYPT 84,
More informationLoad balanced and Efficient Hierarchical Data-Centric Storage in Sensor Networks
Load balanced and Efficient Hierarchical Data-Centric Storage in Sensor Networks Yao Zhao, Yan Chen Northwestern University, Evanston IL, USA {yzhao,ychen}@cs.northwestern.edu Sylvia Ratnasamy Intel Research,
More informationData Caching in Networks with Reading, Writing and Storage Costs
Data Caching in Networks with Reading, 1 Writing and Storage Costs Himanshu Gupta Computer Science Department Stony Brook University Stony Brook, NY 11790 Email: hgupta@cs.sunysb.edu Bin Tang Computer
More informationBacula Open Source Project Bacula Systems (professional support)
Bacula Open Source Project Bacula Systems (professional support) The Enterprise Ready Open Source Network Backup Solu
More informationData Warehousing und Data Mining
Data Warehousing und Data Mining Multidimensionale Indexstrukturen Ulf Leser Wissensmanagement in der Bioinformatik Content of this Lecture Multidimensional Indexing Grid-Files Kd-trees Ulf Leser: Data
More informationEnergy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract Energy efficient load balancing in a Wireless Sensor
More information6.852: Distributed Algorithms Fall, 2009. Class 2
.8: Distributed Algorithms Fall, 009 Class Today s plan Leader election in a synchronous ring: Lower bound for comparison-based algorithms. Basic computation in general synchronous networks: Leader election
More informationData Management in the Cloud: Limitations and Opportunities. Annies Ductan
Data Management in the Cloud: Limitations and Opportunities Annies Ductan Discussion Outline: Introduc)on Overview Vision of Cloud Compu8ng Managing Data in The Cloud Cloud Characteris8cs Data Management
More informationMidterm Practice Problems
6.042/8.062J Mathematics for Computer Science October 2, 200 Tom Leighton, Marten van Dijk, and Brooke Cowan Midterm Practice Problems Problem. [0 points] In problem set you showed that the nand operator
More informationLecture 1: Data Storage & Index
Lecture 1: Data Storage & Index R&G Chapter 8-11 Concurrency control Query Execution and Optimization Relational Operators File & Access Methods Buffer Management Disk Space Management Recovery Manager
More informationEFS: Enhanced FACES Protocol for Secure Routing In MANET
EFS: Enhanced FACES Protocol for Secure Routing In MANET Geethu Bastian Department of Information Technology Rajagiri School of Engineering & Technology, Rajagiri Valley P O Kochi-39, India geethubastian@gmail.com
More informationLecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday
Lecture 14: Data transfer in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday Data transfer over multiple wireless hops Many applications: TCP flow from a wireless node
More information