In-network processing is an efficient way to reduce the transmission cost in wireless sensor networks (WSNs). The in-network processing of many domain-specific computation tasks in WSNs usually requires to losslessly ...
详细信息
ISBN:
(纸本)9781510601550
In-network processing is an efficient way to reduce the transmission cost in wireless sensor networks (WSNs). The in-network processing of many domain-specific computation tasks in WSNs usually requires to losslessly distribute the computation of the tasks into the sensor nodes, which is however usually not easy. In this paper we are concerned with such kind of tasks whose computation can only be partitioned into recursive computation mode. To distribute the recursive computations into WSNs, it is required to design an appropriate single in-network processing path, along which the intermediate data is forwarded and updated in the WSNs. We address the recursive computation with constant size of computation result, e.g., distributed least square estimation (D-LSE). Finding the optimal in-network processing path to minimize the total transmission cost in WSNs, is a new problem and seldom studied before. To solve it, we propose a novel routing algorithm called as S-TSP, and compare it with some other greedy algorithms. Extensive simulations are conducted, and the results show the good performance of the proposed S-TSP algorithm.
It is difficult for the best-effort service way of traditional network to meet QoS requirements of applications. Software Defined Networking (SDN) raises a good idea for the above-mentioned issue. The controller can c...
详细信息
In the last decade place and route algorithms used for large high performance FPGA designs have been successfully adapted from those used in ASIC design flows. All major FPGA tool sets now use advanced analytical glob...
详细信息
ISBN:
(纸本)9781450340397
In the last decade place and route algorithms used for large high performance FPGA designs have been successfully adapted from those used in ASIC design flows. All major FPGA tool sets now use advanced analytical global placement algorithms with sophisticated cell clustering. Thanks to this, fast runtimes and predictable performance on designs with millions of placeable objects empower designers to quickly and often evaluate their decisions. Fast design flow turn-around times and predictability are of tremendous value to help designers improve timing closure problems in their designs, and accommodate them to floorplanning constraints and congestion bottlenecks. Although many P&R related aspects are common between ASIC and FPGA technologies, many are unique to FPGAs. For example, the many tight, rigid constraints, as well as aggressive runtime requirements and the heterogeneity of the problems. As these unique challenges have received relatively little coverage in literature this presentation focuses on the entailing opportunities. In particular, unlike ASICs in which different types of cell instances can be moved between and within rows freely, FPGAs have discrete, fixed heterogeneous resource locations onto which the user design must be fitted: a flip-flop instance in the user netlist can only be placed onto a flip-flop site of the FPGA fabric. Carry chains in FPGA fabrics are very fast, but run only vertically, typically only in one direction. And the routing fabric of an FPGA must impose countless routing restrictions, like one-way routing and input sharing, without which the size of the chip would become prohibitively large. These essential restrictions must be well understood and taken into account in algorithms targeting FPGAs. In its first part, this presentation will cover several examples of such aspects and will suggest approaches. The second part covers incremental compilation, various forms of parallel processing are other must-have features for a co
In the study of routing in opportunistic networks, we find that there are some redundant overhead when the existing epidemic-based routing algorithms exchange summary vectors (SVs) and request vectors (RVs), and store...
详细信息
In the study of routing in opportunistic networks, we find that there are some redundant overhead when the existing epidemic-based routing algorithms exchange summary vectors (SVs) and request vectors (RVs), and store SVs. To address this issue, we propose an efficient low-delay routing algorithm, epidemic routing based on adaptive compression of vectors (ERACV). Our proposed algorithm adaptively shortens the length of SVs and RVs by compressing the same bit sequences, optimizes the mechanism of exchanging SVs and RVs, and improves the order of transmitting data packets. Theoretical analysis verifies the effectiveness of ERACV in decreasing redundant overhead and packet delay. Simulation results show that ERACV reduces SVs' storage and control overheads by at least 18.0% and 35.8%, respectively, as well as decreases the average end-to-end delay of data packets by more than 2.5%, as compared with epidemic routing algorithm and message transmission control scheme. Copyright (c) 2013 John Wiley & Sons, Ltd.
In extant quantum secret sharing protocols, once the secret is shared in a quantum network (qnet) it cannot be retrieved, even if the dealer wishes that his/her secret no longer be available in the network. For instan...
详细信息
In extant quantum secret sharing protocols, once the secret is shared in a quantum network (qnet) it cannot be retrieved, even if the dealer wishes that his/her secret no longer be available in the network. For instance, if the dealer is part of the two qnets, say and and he/she subsequently finds that is more reliable than , he/she may wish to transfer all her secrets from to . Known protocols are inadequate to address such a revocation. In this work we address this problem by designing a protocol that enables the source/dealer to bring back the information shared in the network, if desired. Unlike classical revocation, the no-cloning theorem automatically ensures that the secret is no longer shared in the network. The implications of our results are multi-fold. One interesting implication of our technique is the possibility of routing qubits in asynchronous qnets. By asynchrony we mean that the requisite data/resources are intermittently available (but not necessarily simultaneously) in the qnet. For example, we show that a source S can send quantum information to a destination R even though (a) S and R share no quantum resource, (b) R's identity is unknown to S at the time of sending the message, but is subsequently decided, (c) S herself can be R at a later date and/or in a different location to bequeath her information ('backed-up' in the qnet) and (d) importantly, the path chosen for routing the secret may hit a dead end due to resource constraints, congestion, etc., (therefore the information needs to be back-tracked and sent along an alternate path). Another implication of our technique is the possibility of using insecure resources. For instance, if the quantum memory within an organization is insufficient, it may safely store (using our protocol) its private information with a neighboring organization without (a) revealing critical data to the host and (b) losing control over retrieving the data. Putting the two implications together, namely routing and se
Some characteristics of optical networks can be assessed by analyzing the topology of the network. Many metrics can be used for this purpose. Modularity indicators were already proposed to study complex networks, and ...
详细信息
ISBN:
(纸本)9781509014682
Some characteristics of optical networks can be assessed by analyzing the topology of the network. Many metrics can be used for this purpose. Modularity indicators were already proposed to study complex networks, and they have been useful to clarify many real world problems. In this paper, we propose an indicator inspired in the traditional modularity concept aiming at finding suitable routes in optical networks. The primary goal of this study is to introduce a measure of the degree of interference between routes to be used in the routing process in order to improve the overall performance of optical networks. We provide some preliminary results, which show that our proposal is promising.
A vehicular delay tolerant network (VDTN) is a special type of delay tolerant network (DTN), in which vehicles act as mobile nodes that are carriers of the message. It is characterized by the absence of an end-to-end ...
详细信息
ISBN:
(纸本)9781509021949
A vehicular delay tolerant network (VDTN) is a special type of delay tolerant network (DTN), in which vehicles act as mobile nodes that are carriers of the message. It is characterized by the absence of an end-to-end connectivity between the nodes residing at the extreme ends. The routing in VDTN is critical as nodes are not connected permanently and the goal is to complete the message delivery successfully. We propose an Opportunistic routing algorithm for Emerging Situations (OPPRES) using VDTN to route messages in the real world. OPPRES is based on a utility mechanism for routing messages in VDTN. The algorithm takes into account node's contact history recorded as a utility for forwarding the messages. This history comprises the past encounters of a node with the destination nodes or the relay nodes. The algorithm can be used to route the messages in emergency situations. Simulations show that, our algorithm OPPRES beat some existing DTN routing approaches like PRoPHET and Spray-and-Wait in terms of increased message delivery ratio and less average delivery latency at the cost of the large overhead ratio.
As the rapid increasing of Internet users from all over the world, it is necessary to enhance the reliability and compatibility of network when large number of data transferred frequently. One of the most important se...
详细信息
Network lifetime is one of the most prominent barriers in deploying wireless sensor networks for large-scale applications because these networks employ sensors with nonrenewable scarce energy resources. Sensor nodes d...
详细信息
Network lifetime is one of the most prominent barriers in deploying wireless sensor networks for large-scale applications because these networks employ sensors with nonrenewable scarce energy resources. Sensor nodes dissipate most of their energy in complex routing mechanisms. To cope with limited energy problem, we present EASARA, an energy aware simple ant routing algorithm based on ant colony optimization. Unlike most algorithms, EASARA strives to avoid low energy routes and optimizes the routing process through selection of least hop count path with more energy. It consists of three phases, that is, route discovery, forwarding node, and route selection. We have improved the route discovery procedure and mainly concentrate on energy efficient forwarding node and route selection, so that the network lifetime can be prolonged. The four possible cases of forwarding node and route selection are presented. The performance of EASARA is validated through simulation. Simulation results demonstrate the performance supremacy of EASARA over contemporary scheme in terms of various metrics.
Adaptive routing algorithms help balancing the resource utilization in different parts of the network and hence, prevent a resource becoming the performance bottleneck while other resources are still under-utilized. I...
详细信息
Adaptive routing algorithms help balancing the resource utilization in different parts of the network and hence, prevent a resource becoming the performance bottleneck while other resources are still under-utilized. In this paper, we present a novel approach, called Preemptive Waiting, which is applied to Odd-Even routing algorithm (PWOE). PWOE postpones the saturation traffic rate of NoC by 13.4% compared to OE, under synthetic traffic loads.
暂无评论