Causally Ordered Message Delivery in Mobile Systems*
|
|
|
- Charlotte Barker
- 10 years ago
- Views:
Transcription
1 Causally Ordered Message Delivery in Mobile Systems* Sridhar Alagar and S. Venkatesan Department of Computer Science University of Texas at Dallas, Richardson, TX { abstract There is a growing trend in using mobile computing environment for several applications, and it is important that the mobile systems are provided adequate support both at the systems level and at the communication level. Causal ordering is a useful property, particularly in applications that involve human interactions. In this paper, we present three algorithms for causal ordering in mobile systems. The first algorithm handles the resource constraints of the mobile hosts. But the system is not easily scalable and is not graceful to host disconnections and connections. The second algorithm eliminates the above disadvantages at the cost of inhibiting some messages. The third algorithm is a trade-off between the first two algorithms. 1 Introduction Many of the distributed algorithms designed for static hosts cannot be directly used for mobile systems due to the change in physical connectivity, resource constraints of mobile hosts and limited bandwidth of the wireless links [l]. This has spawned considerable amount of research in mobile computing: designing communication protocols [3, 91, file system operations [4], and providing fault tolerance [5]. In this paper, we consider the problem of providing a particular kind of communication support, namely, causally ordered message delivery to mobile hosts. Consider two messages m and m sent to the same destination such that sending of m happened before sending of m. Causal ordering is obeyed if m is received before m is received. Causal ordering is useful in several applications like management of replicated data, resource allo- This research was supported in part by NSF under Grant No. CCR , by the Texas Advanced Technology Program under Grant No , and by grants from Alcatel Network Systems. cation, monitoring a distributed system, USENET etc., [7, lo]. Causal ordering is best suited for applications that involve human interactions from several locations [lo]; such applications are typical in mobile systems. Some osf the major applications of distributed mobile systems in which causal ordering is useful are teleconferencing, stock trading, collaborative applications, etc. 1.1 Motivat,ion While designing algorithms for mobile systems, the following factors! should be taken into account. F1. F2. F3. F4. The amount of computation performed by a mobile host should be low. The communication overhead in the wireless medium should be minimal. Algorithms should be scalable with respect to the number of mobile hosts. Algorithms should be able to easily handle the effect of hosts disconnections and connections. If mobile hosts are made to execute the traditional causal ordering algorithms (by storing the relevant data structures in the mobile hosts), none of the above factors (FlLF4) can be satisfied. We present three algorithms for causal ordering in mobile systems. Our first algorithm stores the data structures of mobile hosts (MHs) relevant to causal ordering in the mobile support stations (MSSs), and the algorithm is executed by the MSSs on behalf of the MHs. However, the message overhead is proportional to the square of the number of mobile hosts. Thus, factor F3 is not satisfied. Also, the algorithm is graceful to hosts disconnections and connections. Algorithm 2 eliminates the problems in Algorithm 1. The size of the message header is proportional to the square of the number of MSSs. Since the size /95 $ IEEE 169
2 of the header does not vary with the number of mobile hosts, the algorithm is scalable (with respect to the number of the mobile hosts) and host disconnections/connections do not pose any problem. But there may be some inhibition in delivering the messages to the mobile hosts. Our experimental results suggest that delay due to inhibition is less than the delay involved in transmitting and processing the long header (of each message) used in Algorithm 1. Also, the load placed on the MSSs is less compared to Algorithm 1. Algorithm 3 is a hybrid algorithm and is a tradeoff between algorithm 1 and algorithm 2. Every MSS is partioned into IC logical MSSs to reduce the delay due to inhibition in delivering the messages to MHs. However, le cannot be large as this will increase the size of the header and hence the message overhead. A summary of our results is shown in Table 1. 2 Model and Definitions A distributed mobile system consists of a set of mobile hosts and static hosts. A mobile host (MH) is a host whose geographical location can change with time while retaining its connectivity to the network [3]. A static host is a host whose location does not change during the computation. A static host can also be a mobile support station (MSS). An MSS has the necessary infrastructures to support the mobile hosts. For simplicity, we assume that the system consists of only MSSs and MHs. A static host can be considered as an MH that does not move. The geographical area within which an MSS supports MHs is called a cell. Communication between MHs and MSSs is through a wireless channel. An MH can communicate directly with an MSS only if the MH is located in the cell of the MSS. A mobile host may belong to at most one cell at any time. Mobile hosts communicate with other hosts through their MSSst. MSSs are connected among themselves using wired channels. The MSSs and the wired channels constitute the static network. We assume that a logical channel exists between every pair of MSSs. These logical channels need not be FIFO channels; whereas the wireless channels are FIFO. Both wired and wireless channels are reliable and take an arbitrary but finite amount of time to deliver messages. A mobile host can migrate from one cell to another cell at any time. Every MSS periodically broadcasts a beacon [3]. Let MH hl move from the cell of MSS s1!the MSS of an MH is the MSS in whose cell the MH is located. to the cell of s2. hl discovers that it is in the cell of sz after receiving the beacon broadcast by sa. MH hl informs MSS s2 of hl s id and the id of its previous MSS SI. A handoff procedure is then executed between s2 and SI. s2 informs s1 about hl s migration and gets the relevant information associated with hl from MSS S1. A mobile host can disconnect itself from the network by sending a disconnect message to its current MSS and can reconnect at a later time by sending a connect message. If an MSSs receives a message for any of the disconnected mobile hosts, the message can be stored and delivered to mobile host after it reconnects, or the message can be dropped depending on the application. An event in a host may be a send event (sending a message to another host), a receive event (receiving a message from a host), or an internal event which does not involve sending or receiving a message. Let send(m) be the event that corresponds to the sending of message m and recv(m) be the event that corresponds to the receipt of m. Events in a mobile system are ordered based on the happened before relation, +, introduced by Lamport [B]. For any two events e and e, e + e is true if (i) e and e are two events in the same host and e occurs before e or (ii) e corresponds to sending a message m and e corresponds to the receipt of m or (iii) there exists an event e such that e -+ e and e ----f e. Causal ordering of message delivery is obeyed if, for any two messages m and m that have the same destination, send(m) + send(m ) implies that recw(m) -+ recw(m ). 3 Preliminaries Causal ordering was first proposed for the ISIS system [2]. There are several algorithms that implement causal ordering for distributed systems with static hosts 12, 7, 81. The algorithm by Birman and Joseph [a] appends, to every message, the history of the communications that happened before the sending of the message. The size of the appended information can become unbounded. However, the channels need not be reliable. The algorithm by Raynal, Schiper and Toueg, referred henceforth as RST algorithm, is based on message counting and assumes the channels to be reliable [7]. The RST algorithm, which we will discuss subsequently, appends N2 integers to every message, where N is the number of hosts in the system. The algorithm by Schiper et al. [8] uses vector clocks and is somewhat similar to the RST algorithm. In this paper we extend the RST algorithm to mobile systems. 170
3 Algorithm Algorithm 1 Algorithm 2 Algorithm 3 Size of message header O(ni) integers O(n:) integers O(k2 * n:) integers O( 1) messages O(n,) messages O(k * The RST algorithm for causal ordering maintains two arrays, DELIV;[N] and SENT;[N, NI, for each host Pi. DELIV;[~] denotes the total number of messages received by Pi from Pj. SENT;[^,^] indicates Pi's knowledge about the number of messages Pk has sent to Pj. The following steps are executed at Pi to ensure causal ordering. When Pi sends message m to Pj, Pi appends its current value of SENT; with m. (Pi sends SENT^) to Pj.) Pi then increments senti[i,j] by 1. On receiving (m,st) from Pj, the causal ordering algorithm at Pi first checks if DELIVi[k] > ST[k, i] for all k. If so, the message m is delivered to the application, DELIVi[j] is incremented by 1, SENT^[^, i] is set to ST[j, i] + 1, and finally SENT^[^, k] is set to maz(st[j, IC], SENT^[^, k]) for all j, k. If not, m is queued till DELIVi[k] 2 S?"[k, i] for all k. 4 Algorithm 1 Algorithm 1 consists of two modules: static module and handoff module. The static module is executed when an MH is in a particular cell. The handoff module is executed when an MH moves from one cell to another. 4.1 Static Module For each MH hi, we maintain two arrays- MH_DELIVi[nh] and MH-SENTi[nh, nh], where nh is the number of mobile hosts. MH-DELIV;[j] denotes the total number of messages received by hi from hj. MH-SENTI [k, j] indicates hi's knowledge about the number of messages hk has sent to hj. Assume that MH hi is in the cell of MSS sk. To reduce the communication and computation overhead of MH hi, these arrays are stored in MSS sk. Since the messages from (to) hi go through MSS sk, the causal ordering algorithm is executed by MSS sk. Initially, all the entries in the arrays MHDELIV; and MH-SENT; are set to 0. To send a message m to another MH hj, hi first sends the message m to its MSS Sk. sk sends (~,MH-SENT;) to the MSS of hj and increments MH-SENT;[~, j]. There are several protocols [3, 91 that ensure reliable message delivery to mobile hosts. Any of these protocols can be used. MSS sk, on receiving a message (m, ST) meant for hi from MH hj, first checks whether m is deliueruble. m is deliverable if MH-DELIVi[k] 2 ST[k,i] for all k. If so, sk transmits m to hi, increments MH-DELI'V;[j], and MH-SENTj [j, k] is set to maz(st[j, IC], MHSENT~[~, IC]) for all j, k. m is also temporarily stored by sk in PEND-ACK~. Message m will be deleted from PEND-ACK~ after receiving an ack for m from MB hi. If m is not deliverable, m is stored in MH-PEN DING^ till m becomes deliverable. Whenever a message is delivered to hi, sk checks MH-PEN DING^ for any message that becomes deliverable. 4.2 Handoff' Module Let hi move from the cell of MSS Sk to the cell of MSS st. The handoff module is then executed by Sk and st. After entering the cell of st, MH hi sends the message register(hi, sk) to st. Also, hi retransmits the messages (to st) for which it did not receive ack from its previous MSS sk. MSS st then informs sk that hi has switched from MSS Sk to MSS st by sending a handof-beginfhi) message to sk. After receiving hundof-begin(hi), Sk transfers MHBELIV~, MHSENT~, MHJENDING~, and PEND-ACK~ to MSS st and finally sends message hundofj-over(hi) to st. On receiving these data structures, st first transmits all messages in PENDACK~. Also, st forwards the messages (to their destinations) retransmitted by hi. The handoff procedure is then terminated at st. If MH hi switches to some other cell before the handoff is completed, the current handoff is completed before a new handoff begins. 4.3 Analysis For every message sent by MH hi, the MSS (in whose cell hi resides) sends MH- SENT^ with the mes- 171
4 sage. Hence, the size of the header for every message sent over the static network is O(ni) integers. The handoff module uses O(1) messages of size O(n:) numbers when MH hi switches its cell. Now, consider the factors F1-F4 discussed in Section 1.1. Since Algorithm 1 is executed at MSSs, factors Fl and F2 are satisfied. The overhead in the wireless medium is kept minimal. But factors F3-F4 are not satisfied. An overhead of O(ni) integers over the static network is costly if nh is very large. Also, due to disconnections and connections, nh varies. So during disconnections, some of the entries in the arrays MH-DELIV, and MH-SENT are not needed. The arrays need not be static, but maintaining dynamic arrays can become complicated if the MH disconnections and connections are frequent. In addition, the processing time for upda.ting t,he matrix MH-SENT will be substantial for large n h, and the nontrivial processing time increases the delay in delivering a message. 5 Algorithm 2 In Algorithm 1, messages are tagged with complete information to explicitly maintain causal ordering among the mobile hosts. In Algorithm 2, messages are tagged with sufficient information just to maintain causal ordering among the MSSs. Since the wireless channel between an MSS and an MH in its cell is FIFO, maintaining causal ordering at the static network level is sufficient if the MHs do not move. To ensure that causal ordering is not violated after an MH moves, we incorporate some steps into the handoff procedure. 5.1 Static Module The static module is similar to the static module of Algorithm 1 but for some of the data structures. For each MSS si, we maintain MSS-DELIV;[n,], MSS-SENT;[~,, n,], and MSS-PENDING;. (This is unlike in Algorithm 1 where we maintain these data structures for every mobile host.) Observe that the size of the arrays MSS_DELIV;[n,] and MSSSENT;[R,, n,] vary with n,, the number of MSSs. The value of MSS-DELIV;[j] indicates the number of messages (whose destination can be different MHs) received from MSS sj by MSS si. MSSSENII';[~,~] denotes the number of messages sent by MSS sk (not necessarily delivered) to MSS sj that si knows of. Every MSS knows (need not be exact) about the location of the MHs. Initially, we assume that the initial locations of MHs are known to all MSSs. We show how this knowledge gets updated in the next section. In other aspects, the static module is similar to the static module of algorithm Handoff Module The handoff module is more involved when compared to the handoff module of algorithm 1. Since causal ordering is explicitly maintained only at the MSSs level, some measures have to be taken during handoff to maintain causal ordering after an MH moves. Before we describe the handoff module, we illustrate the problem at hand with an example. Consider mobile hosts hl, hz, and h3. Assume that hl, hz and h3 are in the cells of MSSs SI, s2 and sg respectively. Let h3 send a message ml to hl (ml will be sent to MSS SI) and then send a message m2 to hz. Before receiving ml, let hl switch to the cell of sa. Now, MH ha, after receiving m2 from h3, sends a message m3 for hl to s2. If s2 delivers m3 to hl, causal ordering will be violated because hl has not yet received ml. Also, sz cannot find out from the knowledge it has gained so far whether there are any in-transit messages for hl sent to SI. However, if s2 delivers m3 after ascertaining that all the messages for hl sent to s1 have been delivered, causal ordering will not be violated. Now, we describe the handoff module. Assume that a mobile host hk switches from the cell of MSS si to the cell of MSS sj. After switching, MH hk sends register(hk,si) message to sj. On receiving this message, sj sends the message hando#-begin(hk) to sj, and then broadcasts the message notzfy(hk, si, sj) to all the MSSs. The message notify(hk, si, sj) signifies that MH hk has switched from MSS si to MSS sj. An MSS s, on receiving notify( h k, si, sj) message, updates its local knowledge about the location of MH hk and sends a last(hk) message to si. After receiving notify(hk, s;, sj), MSS s will send messages meant for MH hk only to sj (the new MSS of hk) and not to si (the previous MSS of hk). MSS si, after receiving the message handofl-begin(hk) from sj, sends enable(hk, PEND-ACK~) message to sj and waits for last(hk) messages from all the MSSs. Meanwhile, if any message received by s; for hk becomes deliverable to hk, si marks it as old and forwards it to sj. On receiving the message enable(hk, PEND-ACK~) MSS sj starts sending the application messages sent by hk. Also, sj delivers all the messages in PEND-ACK~ in the FIFO order to MH hk. sj also delivers all the messages for MH hk that are marked old to hk in the order in which the messages arrived. Any mes- 172
5 sages for hk that are not marked old will be queued in MSS-PENDINGj. MSS si (the previous MSS of hk), after receiving last(hk) from all the MSSs sends the message hundo&over(hk) to MSS sj. Observe that no messages for hk sent to si will be in transition after s; receives last(hk) from all the MSSs. (Messages sent as part of handoff module are also causally ordered.) The handoff terminates at sj after handofl-over(hk) is received by sj. If sj receives the message handofl...begin(hk) from some other MSS before the current handoff terminates (this can happen if hk switches its cell), sj will respond to the message only after the handoff terminates. 5.3 Analysis The size of MSSSENT is n: integers and hence the size of each message header over the wired network is O(n3) integers. The overhead does not depend on nh, the number of MHs. Clearly, factors F3-F4 are satisfied. MH connections/disconnections do not affect the size of the arrays MSSDELIV and MSSSENT. During handoff, a notify message has to be sent to all the MSSs, and all the MSSs send lust messages. Hence, the handoff module uses O(n,) messages. The storage requirement of Algorithm 2 and the load placed on the MSSs are less than that of Algorithm 1. Though the handoff module is involved, it does not affect the performance (compared to Algorithm 1) due to the following reasons. (i) MH hk does not wait for the handoff module to terminate to receive messages. It keeps receiving old messages. (ii) Messages sent by hk for other MHs are sent by sj (the new MSS of hk) immediately after sj receives enable message. The drawback of Algorithm 2 is the possibility of a message being inhibited from being delivered to an MH. There is an inhibition in delivering a message to an MH if it is queued in MSSJENDING even though the delivery of the message does not violate causal ordering. Messages may be inhibited because, in Algorithm 2, causal ordering is explicitly implemented among the MSSs. Reception of a message may violate causal ordering from an MSS s point of view; whereas its delivery to an MH may not violate causal ordering from the MH s point of view. However, this delay is less than the delay introduced by Algorithm 1 in transmitting and processing the header of each message. The average delay in delivering a message in Algorithm 2 is considerably less than the delay in Algorithm l when nh increases, as shown in Figure l. (For the details of our simulation model, see Appendix A.) When nh < 30 the message header in both the algo- 0.2 Message0.15 delay in secs algorithm No. of MHs Figure 1: Comparison of Algorithm 1 and Algorithm 2 with respect to message delay. n, = 10 rithms are comparable in size. The message delay in Algorithm 2 is imore than that of Algorithm 1 due to the inhibition inherent in Algorithm 2. However, as nh increases the delay due to processing the message header in Algorithm 1 dominates. 6 Algorithm 3 This algorithm reduces the delay in delivering the messages to MIH due to inhibition, the drawback of Algorithm 2, without much increase in the message overhead. The algorithm achieves this by partioning every physical MSS into k logical MSSs. If an MH enters the cell of an MSS, the MH will be allocated to one of the logical MSSs depending on the load in each logical MSS of the MSS. The MHs will communicate with the other MHs through their logical MSSs. Every logical MSS maintains two arrays MSSDELIV[~ * n,] and MSS-SENT[~ * n,, k * n,] and a queue MSSPENDING. The algorithm is the same as Algorithm 2 except for the fact that causal ordering is explicitly maintained among the logical MSSs. The size of the message header is O(k2 * n:). Messages to lmhs that belong different logical MSSs will not inhibit each other though the MHs may be in the same cell. Thus, as k increases, the unnecessary delay in delivering the message to MH decreases. However, as k increases the size of the message header will increase and, as a result, the time to process the message header will become a dominating factor. In Figure 2, the average message delay initially decreases 173
6 when k increases. But when k becomes large the average message delay increases. 0.4 I I I I I 0.35 MHs = \ 1 Message 0.25 delay 0.2 in secs ci Ir, I / I I I,,I k Figure 2: Message delays for various values of le. n, = 10. [7] RAYNAL, M., SCHIPER, A., AND TOUEG, s. Causal ordering abstraction and a simple way to implement it. Inf. Process. Lett. 39, 6 (1991), [8] SCHIPER, -4., EGGLI, J., AND SANDOZ, A. A new algorithm to implement causal ordering. In Proceedings of the 3rd International Workshop on Distributed Algorithms (1989), Springer Verlag, pp [9] TERAOKA, F., YOKOTE, Y., AND TOKORO, M. A network architecture providing host migration transparency. In Proceedings of ACM SIGCOMM (September 1991). [lo] VAN RENESSE, R. Causal controversy at le mont st.-michel. AGM Operating Systems Review 27, 2 (April 1993), A Simulation Details References BADRINATH, B., ACHARYA, A., AND IMIELIN- SKI, T. Impact of mobility on distributed com- PutationS. ACM Operating Systems Review 27, 2 (April 1993). BIRMAN, K., AND JOSEPH, T. Reliable communications in presence of failures. AGM Trans. Comput. Syst. 5, 1 (1987), IOANNIDIS, J., DUCHAMP, D., AND MAGUIRE, G. IP-based protocols for mobile internetworking. proceedings of ACM SIGCOMM symposzum on Communication Architecture and Proto- Cols (1991), pp KISTLER, J., AND SATYANARAYANA, M. Disconnected operation in coda file system. ACM Trans. Comput. Syst. lu, 1 (February 1992). KRISHNA, P., VAIDYA, N., AND PRADHAN, experiments performed. D. Recovery in distributed mobile environments. In Proceedings of the IEEE Workshop on Advances in Parallel and Distributed Systems (1993), pp LAMPORT, L. Time, clocks, and the ordering of events in a distributed system. Commun. ACM 21, 7 (1978), Our simulation model is similar to that of in [5]. The simulation is event driven and it is run on a Sparc 10 station. The events are send message, receive message, and handoff. The bandwidth of a wired channel is assumed to be 100 Mbits/sec, and the propagation delay in a wired channel is 7 ms. For a wireless channel, the bandwidth and propagation delay are assumed to be 1 Mbits/sec and 500 ps, respectively. Initially, the cells of the mobile hosts are assigned randomly. The time interval between two send events in a mobile host is an exponentially distributed random variable with a mean oft, seconds. The time interval between handoff is also an exponentially distributed random variable with a mean of th seconds. The values of t, and th are varied (0.1, 1.0, 10 secs) to consider different scenario of communication and mobility. The processing time considered in measuring the message delay is the actual CPU running time in processing the message header. The value of every point in the graph is an average of the results of
Preserving Message Integrity in Dynamic Process Migration
Preserving Message Integrity in Dynamic Process Migration E. Heymann, F. Tinetti, E. Luque Universidad Autónoma de Barcelona Departamento de Informática 8193 - Bellaterra, Barcelona, Spain e-mail: [email protected]
A Study of Application Recovery in Mobile Environment Using Log Management Scheme
A Study of Application Recovery in Mobile Environment Using Log Management Scheme A.Ashok, Harikrishnan.N, Thangavelu.V, [email protected], [email protected],[email protected], Bit Campus,
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
Forced Low latency Handoff in Mobile Cellular Data Networks
Forced Low latency Handoff in Mobile Cellular Data Networks N. Moayedian, Faramarz Hendessi Department of Electrical and Computer Engineering Isfahan University of Technology, Isfahan, IRAN [email protected]
Mobile Computing/ Mobile Networks
Mobile Computing/ Mobile Networks TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS Edward Nowicki and John Murphy 1 ABSTRACT The General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly simplify wireless
A NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
Log Management Support for Recovery in Mobile Computing Environment
Log Management Support for Recovery in Mobile Computing Environment J.C. Miraclin Joyce Pamila, Senior Lecturer, CSE & IT Dept, Government College of Technology, Coimbatore, India. [email protected]
Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN
Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical
APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
Locality Based Protocol for MultiWriter Replication systems
Locality Based Protocol for MultiWriter Replication systems Lei Gao Department of Computer Science The University of Texas at Austin [email protected] One of the challenging problems in building replication
Design and Implementation of Distributed Process Execution Environment
Design and Implementation of Distributed Process Execution Environment Project Report Phase 3 By Bhagyalaxmi Bethala Hemali Majithia Shamit Patel Problem Definition: In this project, we will design and
Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular
AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS
AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS Srikanth Tiyyagura Department of Computer Science and Engineering JNTUA College of Engg., pulivendula, Andhra Pradesh, India.
Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow
International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
IEEE 802.16 Broadband Wireless Access Working Group. ATM Based MAC Layer Proposal for the 802.16 Air Interface Specification
Project Title Date Submitted Source Re: Abstract Purpose Notice Release IEEE Patent Policy IEEE 802.16 Broadband Wireless Access Working Group ATM Based MAC Layer Proposal for the 802.16 Air Interface
Resource Allocation Schemes for Gang Scheduling
Resource Allocation Schemes for Gang Scheduling B. B. Zhou School of Computing and Mathematics Deakin University Geelong, VIC 327, Australia D. Walsh R. P. Brent Department of Computer Science Australian
Communications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol
Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 1 Network Topology Specific Instructional Objectives At the end of this lesson, the students will be able to: Specify what is meant by network topology
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
A Novel Approach for Load Balancing In Heterogeneous Cellular Network
A Novel Approach for Load Balancing In Heterogeneous Cellular Network Bittu Ann Mathew1, Sumy Joseph2 PG Scholar, Dept of Computer Science, Amal Jyothi College of Engineering, Kanjirappally, Kerala, India1
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected]
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected] 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
Modular Communication Infrastructure Design with Quality of Service
Modular Communication Infrastructure Design with Quality of Service Pawel Wojciechowski and Péter Urbán Distributed Systems Laboratory School of Computer and Communication Sciences Swiss Federal Institute
A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11
A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 Christian Röhl, Hagen Woesner, Adam Wolisz * Technical University Berlin Telecommunication Networks Group {roehl,
NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS
NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS D. Todinca, P. Perry and J. Murphy Dublin City University, Ireland ABSTRACT The goal of this paper
Low-Cost Checkpointing and Failure Recovery in Mobile Computing Systems Ravi Prakash and Mukesh Singhal Department of Computer and Information Science The Ohio State University Columbus, OH 43210. e-mail:
Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain
Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS
A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS Chandanpreet Kaur Global Institute of Management and Emerging Technologies, Amritsar, Punjab, India, [email protected]
Comparative Analysis of Congestion Control Algorithms Using ns-2
www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,
Computer Networks. Chapter 5 Transport Protocols
Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data
A Reputation Replica Propagation Strategy for Mobile Users in Mobile Distributed Database System
A Reputation Replica Propagation Strategy for Mobile Users in Mobile Distributed Database System Sashi Tarun Assistant Professor, Arni School of Computer Science and Application ARNI University, Kathgarh,
159.735. Final Report. Cluster Scheduling. Submitted by: Priti Lohani 04244354
159.735 Final Report Cluster Scheduling Submitted by: Priti Lohani 04244354 1 Table of contents: 159.735... 1 Final Report... 1 Cluster Scheduling... 1 Table of contents:... 2 1. Introduction:... 3 1.1
A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS
A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS Tarag Fahad, Sufian Yousef & Caroline Strange School of Design and Communication Systems, Anglia Polytechnic University Victoria
RT-QoS for Wireless ad-hoc Networks of Embedded Systems
RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results
Radio Resource Allocation in GSM/GPRS Networks
Radio Resource Allocation in GSM/GPRS Networks Jean-Lien C. Wu 1, Wei-Yeh Chen 2, and Hung-Huan Liu 1 1 Department of Electronic Engineering, National Taiwan University of Science and Technology, 43, Keelung
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS
AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS Hubert GRAJA, Philip PERRY and John MURPHY Performance Engineering Laboratory, School of Electronic Engineering, Dublin City University,
TCP in Wireless Mobile Networks
TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer
Improved Hybrid Dynamic Load Balancing Algorithm for Distributed Environment
International Journal of Scientific and Research Publications, Volume 3, Issue 3, March 2013 1 Improved Hybrid Dynamic Load Balancing Algorithm for Distributed Environment UrjashreePatil*, RajashreeShedge**
Mobile Communications Chapter 9: Mobile Transport Layer
Mobile Communications Chapter 9: Mobile Transport Layer Motivation TCP-mechanisms Classical approaches Indirect TCP Snooping TCP Mobile TCP PEPs in general Additional optimizations Fast retransmit/recovery
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering
Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)
Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including
Location-Aided Routing (LAR) in mobile ad hoc networks
Wireless Networks 6 (2000) 307 321 307 Location-Aided Routing (LAR) in mobile ad hoc networks Young-Bae Ko and Nitin H. Vaidya Department of Computer Science, Texas A&M University, College Station, TX
A Framework for Highly Available Services Based on Group Communication
A Framework for Highly Available Services Based on Group Communication Alan Fekete [email protected] http://www.cs.usyd.edu.au/ fekete Department of Computer Science F09 University of Sydney 2006,
AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK
Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,
Arena 9.0 Basic Modules based on Arena Online Help
Arena 9.0 Basic Modules based on Arena Online Help Create This module is intended as the starting point for entities in a simulation model. Entities are created using a schedule or based on a time between
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas
Module 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
Mobile Tracking and Resource Reservation Scheme for Cellular Networks
Mobile Tracking and Resource Reservation Scheme for Cellular Networks Subbiah Shenbagaraman, B. Prabhakaran, S. Venkatesan Department of Computer Science, University of Texas at Dallas, Richardson, USA,
A Visualization System and Monitoring Tool to Measure Concurrency in MPICH Programs
A Visualization System and Monitoring Tool to Measure Concurrency in MPICH Programs Michael Scherger Department of Computer Science Texas Christian University Email: [email protected] Zakir Hussain Syed
QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data
QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data Md. Golam Shagadul Amin Talukder and Al-Mukaddim Khan Pathan* Department of Computer Science and Engineering, Metropolitan University, Sylhet,
IJMIE Volume 2, Issue 7 ISSN: 2249-0558
Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)
[Sathish Kumar, 4(3): March, 2015] ISSN: 2277-9655 Scientific Journal Impact Factor: 3.449 (ISRA), Impact Factor: 2.114
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY HANDLING HEAVY-TAILED TRAFFIC IN QUEUEING NETWORKS USING MAX WEIGHT ALGORITHM M.Sathish Kumar *, G.Sathish Kumar * Department
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange
Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
Dynamic Source Routing in Ad Hoc Wireless Networks
Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 [email protected] Abstract
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the
Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration
Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration 1 Harish H G, 2 Dr. R Girisha 1 PG Student, 2 Professor, Department of CSE, PESCE Mandya (An Autonomous Institution under
Load Distribution in Large Scale Network Monitoring Infrastructures
Load Distribution in Large Scale Network Monitoring Infrastructures Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Gianluca Iannaccone, and Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {jsanjuas,pbarlet,pareta}@ac.upc.edu
Data Networks Summer 2007 Homework #3
Data Networks Summer Homework # Assigned June 8, Due June in class Name: Email: Student ID: Problem Total Points Problem ( points) Host A is transferring a file of size L to host B using a TCP connection.
CHAPTER 7 SUMMARY AND CONCLUSION
179 CHAPTER 7 SUMMARY AND CONCLUSION This chapter summarizes our research achievements and conclude this thesis with discussions and interesting avenues for future exploration. The thesis describes a novel
Load Balancing in Distributed System. Prof. Ananthanarayana V.S. Dept. Of Information Technology N.I.T.K., Surathkal
Load Balancing in Distributed System Prof. Ananthanarayana V.S. Dept. Of Information Technology N.I.T.K., Surathkal Objectives of This Module Show the differences between the terms CPU scheduling, Job
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at
Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1
Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Gautam Chakrabarti Sandeep Kulkarni Department of Computer Science and Engineering Michigan State University Abstract To ensure uninterrupted
119, Munjiro, Yuseong-gu, Daejeon, Korea. {neofaith, mckim, torshong, kangsw}@icu.ac.kr 2 InfraLab, Korea Telecom
A Mobility Management Scheme using - for Realtime Services across Heterogeneous Networks Hyelim Park 1 Myungchul Kim 1 Sooyong Lee 1 Sungwon Kang 1 Yongho Kim 2 1 School of Engineering, Information and
DeuceScan: Deuce-Based Fast Handoff Scheme in IEEE 802.11 Wireless Networks
: Deuce-Based Fast Handoff Scheme in IEEE 82.11 Wireless Networks Yuh-Shyan Chen, Chung-Kai Chen, and Ming-Chin Chuang Department of Computer Science and Information Engineering National Chung Cheng University,
Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network
Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network 作 者 :Daiqin Yang, Ka-Cheong Leung, and Victor O. K. Li 出 處 :Wireless Communications and Networking Conference, 2007.WCNC
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
Algorithms for Interference Sensing in Optical CDMA Networks
Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern
QoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
Mathematical Modelling of Computer Networks: Part II. Module 1: Network Coding
Mathematical Modelling of Computer Networks: Part II Module 1: Network Coding Lecture 3: Network coding and TCP 12th November 2013 Laila Daniel and Krishnan Narayanan Dept. of Computer Science, University
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
ECE 333: Introduction to Communication Networks Fall 2002
ECE 333: Introduction to Communication Networks Fall 2002 Lecture 14: Medium Access Control II Dynamic Channel Allocation Pure Aloha In the last lecture we began discussing medium access control protocols
Distributed Dynamic Load Balancing for Iterative-Stencil Applications
Distributed Dynamic Load Balancing for Iterative-Stencil Applications G. Dethier 1, P. Marchot 2 and P.A. de Marneffe 1 1 EECS Department, University of Liege, Belgium 2 Chemical Engineering Department,
Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture
Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture W. Lilakiatsakun'. 2, A. Seneviratne' I School of Electrical Engineering and Telecommunication University of New South Wales,
A Statistical Estimation of Average IP Packet Delay in Cellular Data Networks
A Statistical Estimation of Average IP Packet Delay in Cellular Data Networks Hubert GRAJA, Philip PERRY and John MURPHY Performance Engineering Laboratory, Computer Science Department,University College
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
A Review on an Algorithm for Dynamic Load Balancing in Distributed Network with Multiple Supporting Nodes with Interrupt Service
A Review on an Algorithm for Dynamic Load Balancing in Distributed Network with Multiple Supporting Nodes with Interrupt Service Payal Malekar 1, Prof. Jagruti S. Wankhede 2 Student, Information Technology,
TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
A Topology-Aware Relay Lookup Scheme for P2P VoIP System
Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme
