The paper introduces the familiar XY dimension order routing algorithm, odd-even turn model and the combination of both of them with DyAD algorithm, brings forward an improved algorithm that is based on the DyAD. The ...
详细信息
The paper introduces the familiar XY dimension order routing algorithm, odd-even turn model and the combination of both of them with DyAD algorithm, brings forward an improved algorithm that is based on the DyAD. The algorithm aims at the phenomena that when the DyAD meets the congestion, the delay increases seriously as a result that choose the non shortest way. Make a waiting period of time, and then detect the direction of the shortest way of XY and judge if it could transfer the dates in the period of the time. Using the limited waiting instead of choosing the longer path can attain to reduce the delay. The simulations results show that the algorithm can get the least delay and jitter, and provide a better service quality.
routing algorithms play important roles in wireless sensor networks (WSNs). Usually, nodes in a WSN run on battery with limited power. Hence, routing with efficient power consumption is becoming a critical issue for W...
详细信息
routing algorithms play important roles in wireless sensor networks (WSNs). Usually, nodes in a WSN run on battery with limited power. Hence, routing with efficient power consumption is becoming a critical issue for WSNs. In this paper, a routing algorithm, referred to as Energy Prediction and Ant Colony Optimization routing (EPACOR), is proposed. In the EPACOR, when a node needs to deliver data to the sink, ant colony systems are used to establish the route with optimal or sub-optimal power consumption, and meanwhile, learning mechanism is embedded to predict the energy consumption of neighboring nodes when the node chooses a neighboring node added to the route. The EPACOR is compared both with the MST (Minimal Spanning Tree)-based routing algorithm following the Prim algorithm and with the Least Energy Tree (LET)-based routing algorithm following the Dijkstra algorithm. Numeric experiment shows that the EPACOR has the best network lifetime among the three while keeping energy consumption in low level.
We present a new reliable Network-on-Chip (NoC) suitable for Dynamically Reconfigurable Multiprocessors on Chip systems. The proposed NoC is based on routers performing online error detection of routing algorithm and ...
详细信息
We present a new reliable Network-on-Chip (NoC) suitable for Dynamically Reconfigurable Multiprocessors on Chip systems. The proposed NoC is based on routers performing online error detection of routing algorithm and data packet errors. Our work focuses on adaptive routing algorithms which allow to bypass faulty components or processor elements dynamically implemented inside the network. The proposed routing error detection mechanism allows to distinguish routing errors from bypasses of faulty components. The new router architecture is based on additional diagonal state indications and specific logic blocks allowing the reliable operation of the NoC. The main originality in the proposed NoC is that only the permanently faulty parts of the routers are disconnected. Therefore, our approach maintains a high run time throughput in the NoC without data packet loss thanks to a self-loopback mechanism inside each router.
Many applications of ad-hoc networks include intermittent connectivity. Anyone wishing to implement routing into her delay-tolerant network can select from a wide variation of options, but the choice is hard, as there...
详细信息
ISBN:
(纸本)9781424431755
Many applications of ad-hoc networks include intermittent connectivity. Anyone wishing to implement routing into her delay-tolerant network can select from a wide variation of options, but the choice is hard, as there is no strong comparative evidence to the relative performance of the algorithms. Every paper uses a different setting, mostly far from realistic. In our desire to improve the basis for decisions, we simulated a promising selection of DTN routing algorithms in three vastly different scenarios, all based on publicly available real-world traces. Using our open-source DTN simulator, we compare and analyse 11 routing techniques, then provide explanations for the behaviour and give advice for choosing a suitable mechanism. To our own surprise, the results challenge the conventional wisdom gained from synthetic simulations and poses the question whether the world is ready for DTNs.
We consider the span restoration (SR) technique for CO-OFDM-based elastic optical networks under spectrum conversion. We develop a mixed integer linear programming (MILP) model to minimize required spare capacity and ...
详细信息
ISBN:
(纸本)9781557529572
We consider the span restoration (SR) technique for CO-OFDM-based elastic optical networks under spectrum conversion. We develop a mixed integer linear programming (MILP) model to minimize required spare capacity and maximize restored traffic flows.
routing in VANET is a challenging task as the nodes remain highly mobile and there is frequent disconnection and reconnection of node links. Estimating link time to remain connected with the nodes is therefore an impo...
详细信息
ISBN:
(纸本)9781634396226
routing in VANET is a challenging task as the nodes remain highly mobile and there is frequent disconnection and reconnection of node links. Estimating link time to remain connected with the nodes is therefore an important task in VANETs as various routing algorithms can drastically degrade in performance due to change in link status. Various algorithms proposed earlier provide the link estimation but almost all are dependent on specialized GPS to locate position of nodes. Position based routing protocols are becoming popular due to advancement and availability of GPS devices but they can be less accurate as their accuracy is only up to 5 to 10 meters in outdoor environments. In addition, a GPS is not applicable in locations where no line of sight exists, e.g., in a tunnel. The other drawback of GPS is that it cannot locate a vehicle which is inside big campuses like universities and airports. In this paper we propose a mechanism that estimates the link stability time without making use of GPS. The routing decisions are taken based upon the link time and the direction of the nodes. Our simulation results prove the purpose of using this approach in VANETs.
In this study, the author investigates the problem of lifetime enhancement of mobile nodes in mobile ad hoc networks. Here, the author uses two metrics namely, residual battery capacity of the node and non-critical no...
详细信息
In this study, the author investigates the problem of lifetime enhancement of mobile nodes in mobile ad hoc networks. Here, the author uses two metrics namely, residual battery capacity of the node and non-critical node to route the data packets from the source to the destination. The proposed model uses the non-critical node if all the nodes contain residual battery capacity above the threshold value. The proposed model has been simulated using Qualnet Simulator-4.5. The proposed model has compared against the existing algorithms such as minimum total transmission power routing, conditional max-min battery capacity routing and lifetime prediction routing. From the results, the author concludes that the proposed model has reached at the top position in terms of the number of survived nodes, energy saving and number of nodes with zero remaining energy.
To reduce connection blocking caused by spectrum fragmentation in future elastic optical networks, we propose the split-spectrum channel scheme and a spectrum allocation algorithm. Simulations are done to show its rem...
详细信息
ISBN:
(纸本)9781557529572
To reduce connection blocking caused by spectrum fragmentation in future elastic optical networks, we propose the split-spectrum channel scheme and a spectrum allocation algorithm. Simulations are done to show its remarkable performance.
Higher global bandwidth requirement for many applications and lower network cost have motivated the use of the Dragonfly network topology for high performance computing systems. In this paper we present the architectu...
详细信息
ISBN:
(纸本)9781467308052
Higher global bandwidth requirement for many applications and lower network cost have motivated the use of the Dragonfly network topology for high performance computing systems. In this paper we present the architecture of the Cray Cascade system, a distributed memory system based on the Dragonfly [1 ] network topology. We describe the structure of the system, its Dragonfly network and the routing algorithms. We describe a set of advanced features supporting both mainstream high performance computing applications and emerging global address space programing models. We present a combination of performance results from prototype systems and simulation data for large systems. We demonstrate the value of the Dragonfly topology and the benefits obtained through extensive use of adaptive routing.
In this paper, we conduct feasibility studies on the average delay space for Cloud computing, and we propose a heuristic method to control the vector of average delays, subject to predefined delay constraints. Our wor...
详细信息
ISBN:
(纸本)9781457720529
In this paper, we conduct feasibility studies on the average delay space for Cloud computing, and we propose a heuristic method to control the vector of average delays, subject to predefined delay constraints. Our work is strongly motivated by the fact that delay control plays a critical role to improve Service Level Agreements (SLA) between users and Cloud service providers, which is necessary for empowering online business. Specifically, our main contributions are two-fold: First, the feasible regions of various routing algorithms for the system's dispatcher are investigated in depth. Second, a simple heuristic algorithm is designed, to move the average delay point along the feasible direction until achieving the delay constraints. Average delay is dependent on multiple factors such as job size, inter-arrival time, flow rate, and the dispatching rules of the system. Therefore, we vary their distribution, parameters and routing rules to examine how the feasible regions move or change. After establishing the feasible delay space, then by moving along the feasible directions, we show that a simple heuristic algorithm can achieve the delay constraints for a two queue system.
暂无评论