首页 > 最新文献

7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.最新文献

英文 中文
A new approach to distribute program workload on software DSM clusters 在软件DSM集群上分配程序工作负载的新方法
Tyng-Yeu Liang, Yen-Tso Liu, C. Shieh, Chun-Yi Wu
The workload distribution approaches used by software distributed shared memory (DSM) clusters always distribute the working threads of applications according to the computational power of processors. However, in addition to computational cost, the cost of memory accesses is an important factor for determining program performance. Neglecting this cost will result in making wrong decisions in workload distribution and then degrading program performance. To address this problem, we propose a new approach with simultaneously considering the memory capability and the computational power of processors for workload distribution on software DSM clusters in this paper. We have implemented the proposed approach on a test bed. Our experimental results show that the proposed approach can provide more performance improvement for the applications compared to the others with considering only computational powers or memory capabilities.
软件分布式共享内存(DSM)集群使用的工作负载分配方法总是根据处理器的计算能力来分配应用程序的工作线程。然而,除了计算成本之外,内存访问成本也是决定程序性能的一个重要因素。忽略此成本将导致在工作负载分配中做出错误的决策,从而降低程序性能。为了解决这一问题,本文提出了一种同时考虑处理器的存储能力和计算能力的软件DSM集群工作负载分配的新方法。我们已经在一个试验台上实现了所提出的方法。实验结果表明,与仅考虑计算能力或内存容量的其他方法相比,所提出的方法可以为应用程序提供更多的性能改进。
{"title":"A new approach to distribute program workload on software DSM clusters","authors":"Tyng-Yeu Liang, Yen-Tso Liu, C. Shieh, Chun-Yi Wu","doi":"10.1109/ISPAN.2004.1300481","DOIUrl":"https://doi.org/10.1109/ISPAN.2004.1300481","url":null,"abstract":"The workload distribution approaches used by software distributed shared memory (DSM) clusters always distribute the working threads of applications according to the computational power of processors. However, in addition to computational cost, the cost of memory accesses is an important factor for determining program performance. Neglecting this cost will result in making wrong decisions in workload distribution and then degrading program performance. To address this problem, we propose a new approach with simultaneously considering the memory capability and the computational power of processors for workload distribution on software DSM clusters in this paper. We have implemented the proposed approach on a test bed. Our experimental results show that the proposed approach can provide more performance improvement for the applications compared to the others with considering only computational powers or memory capabilities.","PeriodicalId":198404,"journal":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131987673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On a region-of-interest based approach to robust wireless video transmission 基于兴趣区域的鲁棒无线视频传输方法研究
A. C. Wong, Yu-Kwong Kwok
This paper presents a scheme aiming at transmitting real-time video to wireless channel with vigorously varying quality, which is in practice the norm rather than the exception. Region of interest (ROI) is an efficient approach to making the video more adaptive to the wireless channel because ROI is the region that human eyes tend to put more attention to than the remainder region (RM). In our proposed scheme, we adopted this feature. The real-time source video stream is divided into two regions, the ROI and the RM regions. The two regions were encoded using H.263 standard codec such that the video transmission is adaptive to the current channel state, which is characterized by the effective data rate that varies from tens of kilobits per second to hundreds of kilobits per second. Channel state parameters are fed back to the source coder to adjust the compression ratio as well as the intra/inter options of the encoders. Results including frame loss probability, compression characteristics, peak signal to noise ratio (PSNR) against channel states are given, indicating that the resulting adaptive video codec can respond judiciously to time-varying channel quality. Our scheme is evaluated together with a ROI-enabled moving picture coding standard JPEG2000. Using the features provided in JPEG2000, we have made the JPEG2000 codec adaptive to the vigorously varying wireless channel and then compared it with the H.263 scheme. Our technique is suitable for a broad area of applications including real-time news reporting and video conferencing.
本文提出了一种将实时视频传输到质量剧烈变化的无线信道的方案,这在实践中是一种常态而不是例外。由于感兴趣区域是人眼比剩余区域更容易关注的区域,因此感兴趣区域(ROI)是提高视频对无线信道适应性的有效方法。在我们提出的方案中,我们采用了这一特性。实时源视频流分为ROI和RM两个区域。这两个区域采用H.263标准编解码器进行编码,使视频传输能够适应当前信道状态,其特点是有效数据速率从数十千比特/秒到数百千比特/秒不等。通道状态参数被反馈到源编码器,以调整压缩比以及编码器的内部/内部选项。给出了帧丢失概率、压缩特性、峰值信噪比(PSNR)对信道状态的影响等结果,表明所得到的自适应视频编解码器能够对时变信道质量做出明智的响应。我们的方案与支持roi的运动图像编码标准JPEG2000一起进行了评估。利用JPEG2000提供的特性,使JPEG2000编解码器能够适应剧烈变化的无线信道,并与H.263编解码器进行比较。我们的技术适用于广泛的应用领域,包括实时新闻报道和视频会议。
{"title":"On a region-of-interest based approach to robust wireless video transmission","authors":"A. C. Wong, Yu-Kwong Kwok","doi":"10.1109/ISPAN.2004.1300510","DOIUrl":"https://doi.org/10.1109/ISPAN.2004.1300510","url":null,"abstract":"This paper presents a scheme aiming at transmitting real-time video to wireless channel with vigorously varying quality, which is in practice the norm rather than the exception. Region of interest (ROI) is an efficient approach to making the video more adaptive to the wireless channel because ROI is the region that human eyes tend to put more attention to than the remainder region (RM). In our proposed scheme, we adopted this feature. The real-time source video stream is divided into two regions, the ROI and the RM regions. The two regions were encoded using H.263 standard codec such that the video transmission is adaptive to the current channel state, which is characterized by the effective data rate that varies from tens of kilobits per second to hundreds of kilobits per second. Channel state parameters are fed back to the source coder to adjust the compression ratio as well as the intra/inter options of the encoders. Results including frame loss probability, compression characteristics, peak signal to noise ratio (PSNR) against channel states are given, indicating that the resulting adaptive video codec can respond judiciously to time-varying channel quality. Our scheme is evaluated together with a ROI-enabled moving picture coding standard JPEG2000. Using the features provided in JPEG2000, we have made the JPEG2000 codec adaptive to the vigorously varying wireless channel and then compared it with the H.263 scheme. Our technique is suitable for a broad area of applications including real-time news reporting and video conferencing.","PeriodicalId":198404,"journal":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132081078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
M-CAN: a lookup protocol for mobile peer-to-peer environment M-CAN:用于移动点对点环境的查找协议
Gang Peng, Shanping Li, Hairong Jin, Tianchi Ma
With the development of the mobile communication technology and P2P, a combination of mobile computing and P2P, MP2P, has revealed its attractions. Compared to traditional P2P, characteristics of MP2P include unreliable connection, limited bandwidth and constrains of mobile devices. Although there have existed some classic lookup protocols for traditional P2P systems, they all fall into impropriety and inefficiency under MP2P because of their scalability limits, unreliability and requirements of bandwidth. In this paper, a new protocol, M-CAN, is proposed for implementing an efficient lookup in MP2P. By grouping and registering resources appropriately, M-CAN accelerates the lookup process in MP2P environment. Tests show that M-CAN can greatly enhance the system performance and effectivity.
随着移动通信技术和P2P的发展,一种将移动计算与P2P相结合的MP2P已经显露出它的魅力。与传统的P2P相比,MP2P具有连接不可靠、带宽有限、移动设备受限等特点。传统的P2P系统虽然存在一些经典的查找协议,但由于其可扩展性的限制、不可靠和对带宽的要求,在MP2P下都存在不合适和低效率的问题。本文提出了一种新的协议M-CAN来实现MP2P的高效查找。通过对资源进行适当的分组和注册,M-CAN可以加快MP2P环境下的查找速度。测试结果表明,M-CAN可以大大提高系统的性能和效率。
{"title":"M-CAN: a lookup protocol for mobile peer-to-peer environment","authors":"Gang Peng, Shanping Li, Hairong Jin, Tianchi Ma","doi":"10.1109/ISPAN.2004.1300535","DOIUrl":"https://doi.org/10.1109/ISPAN.2004.1300535","url":null,"abstract":"With the development of the mobile communication technology and P2P, a combination of mobile computing and P2P, MP2P, has revealed its attractions. Compared to traditional P2P, characteristics of MP2P include unreliable connection, limited bandwidth and constrains of mobile devices. Although there have existed some classic lookup protocols for traditional P2P systems, they all fall into impropriety and inefficiency under MP2P because of their scalability limits, unreliability and requirements of bandwidth. In this paper, a new protocol, M-CAN, is proposed for implementing an efficient lookup in MP2P. By grouping and registering resources appropriately, M-CAN accelerates the lookup process in MP2P environment. Tests show that M-CAN can greatly enhance the system performance and effectivity.","PeriodicalId":198404,"journal":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132469143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Games networks play a game theoretic approach to networks 博弈网络是用博弈论的方法来研究网络的
A. Rextin, Zahid Irfan, Z. Uzmi
Traditional network protocols such as TCP/IP require cooperation between traffic sources to achieve optimal network performance. This approach does not always work, as evident by frequent congestion problems in the Internet. Recent research in protocol design using game theory removes this limitation by modeling traffic sources as competing players and results in efficient and fair distribution of resources. This paper provides theoretical background of the game theoretic approach as applied to networks, describes some previously proposed schemes for minimizing network congestion, elaborates on pricing mechanisms and discusses game-theoretic routing solutions. Pricing provides a feasible solution for congestion control but application of distributed algorithmic mechanism design (DAMD) can be adapted for congestion control.
传统的网络协议,如TCP/IP,需要流量源之间的合作,以达到最优的网络性能。这种方法并不总是有效,正如Internet中频繁出现的拥塞问题所证明的那样。最近在协议设计中使用博弈论的研究通过将流量源建模为竞争参与者来消除这一限制,从而实现有效和公平的资源分配。本文提供了应用于网络的博弈论方法的理论背景,描述了一些先前提出的最小化网络拥塞的方案,详细阐述了定价机制,并讨论了博弈论路由解决方案。定价为拥塞控制提供了一种可行的解决方案,但分布式算法机制设计(DAMD)的应用可以适用于拥塞控制。
{"title":"Games networks play a game theoretic approach to networks","authors":"A. Rextin, Zahid Irfan, Z. Uzmi","doi":"10.1109/ISPAN.2004.1300521","DOIUrl":"https://doi.org/10.1109/ISPAN.2004.1300521","url":null,"abstract":"Traditional network protocols such as TCP/IP require cooperation between traffic sources to achieve optimal network performance. This approach does not always work, as evident by frequent congestion problems in the Internet. Recent research in protocol design using game theory removes this limitation by modeling traffic sources as competing players and results in efficient and fair distribution of resources. This paper provides theoretical background of the game theoretic approach as applied to networks, describes some previously proposed schemes for minimizing network congestion, elaborates on pricing mechanisms and discusses game-theoretic routing solutions. Pricing provides a feasible solution for congestion control but application of distributed algorithmic mechanism design (DAMD) can be adapted for congestion control.","PeriodicalId":198404,"journal":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132901848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
How to parallelize cellular neural networks on cluster architectures 如何在集群架构上并行化细胞神经网络
Thomas Weishäupl, E. Schikuta
In this paper, we present "rules of thumb" for the efficient and straight-forward parallelization of cellular neural networks (CNNs) processing image data on cluster architectures. The rules result from the application and optimization of the simple but effective structural data parallel approach, which is based on the SPMD model. Digital gray-scale images were used to evaluate the optimized parallel cellular neural network program. The process of parallelizing the algorithm employs HPF to generate an MPI-based program.
在本文中,我们提出了“经验法则”,用于在集群架构上处理图像数据的细胞神经网络(cnn)的高效和直接并行化。这些规律是基于SPMD模型的简单有效的结构数据并行方法的应用和优化的结果。采用数字灰度图像对优化后的并行细胞神经网络程序进行评价。算法的并行化过程采用HPF生成基于mpi的程序。
{"title":"How to parallelize cellular neural networks on cluster architectures","authors":"Thomas Weishäupl, E. Schikuta","doi":"10.1109/ISPAN.2004.1300519","DOIUrl":"https://doi.org/10.1109/ISPAN.2004.1300519","url":null,"abstract":"In this paper, we present \"rules of thumb\" for the efficient and straight-forward parallelization of cellular neural networks (CNNs) processing image data on cluster architectures. The rules result from the application and optimization of the simple but effective structural data parallel approach, which is based on the SPMD model. Digital gray-scale images were used to evaluate the optimized parallel cellular neural network program. The process of parallelizing the algorithm employs HPF to generate an MPI-based program.","PeriodicalId":198404,"journal":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131207760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A network security architectural approach for systems integrity using multi agent systems engineering 使用多代理系统工程实现系统完整性的网络安全体系结构方法
G. Torrellas
Ideally, information systems security enables management to have confidence that their computational systems provide the information requested and expected, while denying accessibility to those who have no right to it. The analysis of incidents resulting in damage to information systems show that most losses were still due to errors or omissions by authorized users, actions of disgruntled employees, and an increase in external penetrations of systems by outsiders. Traditional controls are normally inadequate in these cases or are focused on the wrong threat, resulting in the exposure of vulnerability. Security is a critical parameter for the expansion and wide usage of agent technology. A threat model is constructed and subsequently the basic techniques to deal effectively with these threats are analyzed. This paper presents a dynamic, extensible, configurable and interoperable security architecture for mobile agent systems. It is explained how this architecture can be used to tackle a big part of security threats. All the components of the security architecture are analyzed while we also argue for the benefits they offer.
理想情况下,信息系统安全使管理人员能够确信他们的计算系统提供了所请求和期望的信息,同时拒绝那些无权访问这些信息的人。对导致信息系统损坏的事件的分析表明,大多数损失仍然是由于授权用户的错误或遗漏、心怀不满的雇员的行动以及外部人员对系统的外部渗透的增加。在这些情况下,传统的控制通常是不够的,或者集中在错误的威胁上,导致脆弱性暴露。安全性是代理技术得到推广和广泛应用的关键参数。首先建立了威胁模型,然后分析了有效处理这些威胁的基本技术。提出了一种动态、可扩展、可配置、可互操作的移动代理系统安全体系结构。它解释了如何使用此体系结构来处理大部分安全威胁。我们分析了安全体系结构的所有组件,同时也讨论了它们提供的好处。
{"title":"A network security architectural approach for systems integrity using multi agent systems engineering","authors":"G. Torrellas","doi":"10.1109/ISPAN.2004.1300544","DOIUrl":"https://doi.org/10.1109/ISPAN.2004.1300544","url":null,"abstract":"Ideally, information systems security enables management to have confidence that their computational systems provide the information requested and expected, while denying accessibility to those who have no right to it. The analysis of incidents resulting in damage to information systems show that most losses were still due to errors or omissions by authorized users, actions of disgruntled employees, and an increase in external penetrations of systems by outsiders. Traditional controls are normally inadequate in these cases or are focused on the wrong threat, resulting in the exposure of vulnerability. Security is a critical parameter for the expansion and wide usage of agent technology. A threat model is constructed and subsequently the basic techniques to deal effectively with these threats are analyzed. This paper presents a dynamic, extensible, configurable and interoperable security architecture for mobile agent systems. It is explained how this architecture can be used to tackle a big part of security threats. All the components of the security architecture are analyzed while we also argue for the benefits they offer.","PeriodicalId":198404,"journal":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131076722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Knowledge states for the caching problem in shared memory multiprocessor systems 共享内存多处理器系统中缓存问题的知识状态
W. Bein, L. Larmore, R. Reischuk
Multiprocessor systems with a global shared memory provide logically uniform data access. To hide latencies when accessing global memory each processor makes use of a private cache. Several copies of a data item may exist concurrently in the system. To guarantee consistency when updating an item a processor must invalidate copies of the item in other private caches. To exclude the effect of classical paging faults, one assumes that each processor knows its own data access sequence, but does not know the sequence of future invalidations requested by other processors. Performance of a processor with this restriction can be measured against the optimal behavior of a theoretical omniscient processor, using competitive analysis. A 4/3 competitive randomized online algorithm for this problem for cache size 2 is presented. This algorithm is derived with the help of a new concept we call knowledge states. We also prove a matching lower bound, thus this online algorithm is best possible. Finally, a lower bound of 3/2 on the competitiveness for larger cache sizes is shown.
具有全局共享内存的多处理器系统提供逻辑上统一的数据访问。为了隐藏访问全局内存时的延迟,每个处理器都使用私有缓存。一个数据项的多个副本可以并发地存在于系统中。为了保证更新项时的一致性,处理器必须使该项在其他私有缓存中的副本失效。为了排除经典分页错误的影响,假设每个处理器都知道自己的数据访问顺序,但不知道其他处理器请求的未来失效顺序。使用竞争分析,可以根据理论上的全知处理器的最佳行为来衡量具有此限制的处理器的性能。针对该问题,提出了一种4/3竞争随机在线算法。该算法是借助于一个叫做知识状态的新概念推导出来的。我们还证明了一个匹配的下界,因此这种在线算法是最好的。最后,显示了较大缓存大小的竞争力的3/2的下界。
{"title":"Knowledge states for the caching problem in shared memory multiprocessor systems","authors":"W. Bein, L. Larmore, R. Reischuk","doi":"10.1142/S0129054109006504","DOIUrl":"https://doi.org/10.1142/S0129054109006504","url":null,"abstract":"Multiprocessor systems with a global shared memory provide logically uniform data access. To hide latencies when accessing global memory each processor makes use of a private cache. Several copies of a data item may exist concurrently in the system. To guarantee consistency when updating an item a processor must invalidate copies of the item in other private caches. To exclude the effect of classical paging faults, one assumes that each processor knows its own data access sequence, but does not know the sequence of future invalidations requested by other processors. Performance of a processor with this restriction can be measured against the optimal behavior of a theoretical omniscient processor, using competitive analysis. A 4/3 competitive randomized online algorithm for this problem for cache size 2 is presented. This algorithm is derived with the help of a new concept we call knowledge states. We also prove a matching lower bound, thus this online algorithm is best possible. Finally, a lower bound of 3/2 on the competitiveness for larger cache sizes is shown.","PeriodicalId":198404,"journal":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122589723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Gravity routing in ad hoc networks: integrating geographical and topology-based routing 自组织网络中的重力路由:集成基于地理和拓扑的路由
P. Hsiao, H. T. Kung
Gravity routing is a routing protocol that uses geographical routing such as GPSR to forward packets toward regions, where topology-based routing protocol such as DSR and AODV works well. That is, packets are "gravitated" toward these regions. This hybrid approach has two advantages: first, it can improve the performance of geographical routing by taking into account the existence of such regions; second, topology-based routing is limited to only run in small regions with fewer nodes where it works well. This paper describes the basic concepts of gravity routing, discusses design and implementation considerations, and provides simulation results demonstrating the superiority of the hybrid approach in nonuniform ad hoc networks. In addition, we describe a region-management-free method for gravity routing that avoids the need of maintaining regions.
重力路由是一种使用地理路由(如GPSR)将数据包转发到区域的路由协议,在这种情况下,基于拓扑的路由协议(如DSR和AODV)可以很好地工作。也就是说,数据包被“吸引”到这些区域。这种混合方法有两个优点:一是考虑了地理区域的存在性,提高了地理路由的性能;其次,基于拓扑的路由仅限于在节点较少的小区域内运行。本文介绍了重力路由的基本概念,讨论了设计和实现的考虑,并提供了仿真结果,证明了混合方法在非均匀自组织网络中的优越性。此外,我们还描述了一种无需区域管理的重力路由方法,避免了维护区域的需要。
{"title":"Gravity routing in ad hoc networks: integrating geographical and topology-based routing","authors":"P. Hsiao, H. T. Kung","doi":"10.1109/ISPAN.2004.1300512","DOIUrl":"https://doi.org/10.1109/ISPAN.2004.1300512","url":null,"abstract":"Gravity routing is a routing protocol that uses geographical routing such as GPSR to forward packets toward regions, where topology-based routing protocol such as DSR and AODV works well. That is, packets are \"gravitated\" toward these regions. This hybrid approach has two advantages: first, it can improve the performance of geographical routing by taking into account the existence of such regions; second, topology-based routing is limited to only run in small regions with fewer nodes where it works well. This paper describes the basic concepts of gravity routing, discusses design and implementation considerations, and provides simulation results demonstrating the superiority of the hybrid approach in nonuniform ad hoc networks. In addition, we describe a region-management-free method for gravity routing that avoids the need of maintaining regions.","PeriodicalId":198404,"journal":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126006798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Adaptive fault-tolerant wormhole routing with two virtual channels in 2D meshes 二维网格中具有两个虚拟通道的自适应容错虫洞路由
Jipeng Zhou, F. Lau
An adaptive fault-tolerant wormhole routing algorithm based on a convex fault model in 2D meshes is presented. With the algorithm, a normal routing message, when blocked by faulty processors, would detour along some special polygons around the fault region. The result is that the proposed algorithm can tolerate convex faults with only two virtual channels per physical channel regardless of the overlapping of the boundaries of different fault regions. The convex fault model used does not include any nonfaulty processors and the proposed algorithm is deadlock-free.
提出了一种基于二维网格凸故障模型的自适应容错虫洞路由算法。利用该算法,当正常的路由消息被故障处理器阻塞时,将沿着故障区域周围的一些特殊多边形绕行。结果表明,无论不同故障区域的边界是否重叠,该算法都能容忍每个物理通道只有两个虚拟通道的凸故障。采用的凸故障模型不包含任何非故障处理器,该算法无死锁。
{"title":"Adaptive fault-tolerant wormhole routing with two virtual channels in 2D meshes","authors":"Jipeng Zhou, F. Lau","doi":"10.1109/ISPAN.2004.1300472","DOIUrl":"https://doi.org/10.1109/ISPAN.2004.1300472","url":null,"abstract":"An adaptive fault-tolerant wormhole routing algorithm based on a convex fault model in 2D meshes is presented. With the algorithm, a normal routing message, when blocked by faulty processors, would detour along some special polygons around the fault region. The result is that the proposed algorithm can tolerate convex faults with only two virtual channels per physical channel regardless of the overlapping of the boundaries of different fault regions. The convex fault model used does not include any nonfaulty processors and the proposed algorithm is deadlock-free.","PeriodicalId":198404,"journal":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122035538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Cooperation of RSVP, DiffServ for frequent and fast intersubnet handoff 配合RSVP、DiffServ实现频繁、快速的子网间切换
Bingyi Zhang, Yamin Sun
For the problems raised by frequent and fast intersubnet handoff, some methods based on resource reservation protocol (RSVP) extensions or differentiated services (DiffServ) model have been proposed. The merit and drawbacks of these methods are described in this paper respectively. Then a new scheme is proposed which include the merit of RSVP and DiffServ. It can explicitly provide enough quality of service (QoS) guarantee using RSVP in normal case. When the mobile host moves fast and occurs frequent intersubnet handoff, it immediately uses DiffServ to provide temporary QoS guarantee and keep handoff no dropping.
针对子网间频繁快速切换带来的问题,提出了基于资源预留协议(RSVP)扩展或差分服务(DiffServ)模型的方法。本文分别介绍了这些方法的优缺点。然后提出了一种结合RSVP和diffserver优点的新方案。在正常情况下,使用RSVP可以显式地提供足够的服务质量(QoS)保证。当移动主机移动速度快,子网间切换频繁时,立即使用DiffServ提供临时QoS保证,保持切换不掉。
{"title":"Cooperation of RSVP, DiffServ for frequent and fast intersubnet handoff","authors":"Bingyi Zhang, Yamin Sun","doi":"10.1109/ISPAN.2004.1300517","DOIUrl":"https://doi.org/10.1109/ISPAN.2004.1300517","url":null,"abstract":"For the problems raised by frequent and fast intersubnet handoff, some methods based on resource reservation protocol (RSVP) extensions or differentiated services (DiffServ) model have been proposed. The merit and drawbacks of these methods are described in this paper respectively. Then a new scheme is proposed which include the merit of RSVP and DiffServ. It can explicitly provide enough quality of service (QoS) guarantee using RSVP in normal case. When the mobile host moves fast and occurs frequent intersubnet handoff, it immediately uses DiffServ to provide temporary QoS guarantee and keep handoff no dropping.","PeriodicalId":198404,"journal":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129337761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1