144,623 research outputs found

    Energy distribution control in wireless sensor networks through range optimization

    Get PDF
    A major objective in wireless sensor networks is to find optimum routing strategies for energy efficient use of nodes. Routing decision and transmission power selection are intrinsically connected since the transmission power of a node is adjusted depending on the location of the next hop. In this paper, we propose a location-based routing framework to control the energy distribution in a network where transmission ranges, hence powers, of nodes are determined based on their locations. We show that the proposed framework is sufficiently general to investigate the minimum-energy and maximum-lifetime routing problems. It is shown that via the location based strategy the network lifetime can be improved by 70% and the total energy consumption can be decreased to three-fourths to one-third of the constant transmission range strategy depending on the propagation medium and the size of the network

    Multipacket Routing on Rings

    Get PDF
    We study multipacket routing problems. We divide the multipacket routing problem into two classes, namely, distance limited and bisection limited routing problems. Then, we concentrate on rings of processors. Having a full understanding of the multipacket routing problem on rings is essential before trying to attack the problem for the more general case of r-dimensional meshes and tori. We prove a new lower bound of 2n/3 routing steps for the case of distance limited routing problems. We also give an algorithm that tightens this lower bound. For bisection limited problems, we present an algorithm that completes the routing in near optimal time

    Greedy Channel Router Implementation in FORTRAN

    Get PDF
    During this project, the Greedy Channel Router was implemented in FORTRAN. This will allow students to break their general routing problems into channel routing problems to be done by the program. Since many students know FORTRAN, it will also be possible to build on the program and develop a more general router in the future [1]

    Privacy-preserving Cross-domain Routing Optimization -- A Cryptographic Approach

    Full text link
    Today's large-scale enterprise networks, data center networks, and wide area networks can be decomposed into multiple administrative or geographical domains. Domains may be owned by different administrative units or organizations. Hence protecting domain information is an important concern. Existing general-purpose Secure Multi-Party Computation (SMPC) methods that preserves privacy for domains are extremely slow for cross-domain routing problems. In this paper we present PYCRO, a cryptographic protocol specifically designed for privacy-preserving cross-domain routing optimization in Software Defined Networking (SDN) environments. PYCRO provides two fundamental routing functions, policy-compliant shortest path computing and bandwidth allocation, while ensuring strong protection for the private information of domains. We rigorously prove the privacy guarantee of our protocol. We have implemented a prototype system that runs PYCRO on servers in a campus network. Experimental results using real ISP network topologies show that PYCRO is very efficient in computation and communication costs

    An evolutionary approach to time constrained routing problems

    Get PDF
    Routing problems are an important class of planning problems. Usually there are many different constraints and optimization criteria involved, and it is difficult to find general methods for solving routing problems. We propose an evolutionary solver for such planning problems. An instance of this solver has been tested on a specific routing problem with time constraints. The performance of this evolutionary solver is compared to a biased random solver and a biased hillclimber solver. Results show that the evolutionary solver performs significantly better than the other two solvers
    • …
    corecore