Smart Resource Allocation in Internet-Of-Things

Total Page:16

File Type:pdf, Size:1020Kb

Smart Resource Allocation in Internet-Of-Things Smart Resource Allocation in Internet-of-Things: Perspectives of Network, Security, and Economics by Ruozhou Yu A Dissertation Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy Approved June 2019 by the Graduate Supervisory Committee: Guoliang Xue, Chair Dijiang Huang Arunabha Sen Yanchao Zhang ARIZONA STATE UNIVERSITY August 2019 ABSTRACT Emerging from years of research and development, the Internet-of-Things (IoT) has finally paved its way into our daily lives. From smart home to Industry 4.0, IoT has been fundamentally transforming numerous domains with its unique superpower of interconnecting world-wide devices. However, the capability of IoT is largely constrained by the limited resources it can employ in various application scenarios, including computing power, network resource, dedicated hardware, etc. The situation is further exacerbated by the stringent quality-of-service (QoS) requirements of many IoT applications, such as delay, bandwidth, security, reliability, and more. This mismatch in resources and demands has greatly hindered the deployment and utilization of IoT services in many resource-intense and QoS-sensitive scenarios like autonomous driving and virtual reality. I believe that the resource issue in IoT will persist in the near future due to technological, economic and environmental factors. In this dissertation, I seek to address this issue by means of smart resource allocation. I propose mathematical models to formally describe various resource constraints and application scenarios in IoT. Based on these, I design smart resource allocation algorithms and protocols to maximize the system performance in face of resource restrictions. Different aspects are tackled, including networking, security, and economics of the entire IoT ecosystem. For different problems, different algorithmic solutions are devised, including optimal algorithms, provable approximation algorithms, and distributed protocols. The so- lutions are validated with rigorous theoretical analysis and/or extensive simulation experiments. i Dedicated to my wife Rui Sun and my family ii ACKNOWLEDGMENTS Foremost, I would like to express my sincere gratitude to my Ph.D. advisor, Dr. Guoliang Xue, for his continuous support and guidance throughout my study at Arizona State University, for his knowledge, patience, enthusiasm, and probity that have deeply affected me, and most importantly, for his standing care and friendship during my hard times. Having him as my advisor is one of the most fortunate things in my life. This dissertation would not have been possible without the academic guidance and freedom he has given me over the last six years. My Ph.D. study has been supported by NSF grants 1461886, 1704092, and 1717197. I would like to thank my dissertation committee members, Dr. Dijiang Huang, Dr. Arunabha Sen, and Dr. Yanchao Zhang, for their advices and comments. I am honored to have worked with an incredible group of co-authors and collaborators. I am specially thankful to Dr. Jun Huang and Dr. Dan Li, who led me onto the path of academic research. I want to thank my academic siblings, Jian Tang, Satyajayant Misra, Xi Fang, Dejun Yang, Lingjun Li, Xinxin Zhao, and Xiang Zhang, for their precious advices and support for my study, career and life. I am also very grateful to my colleagues and friends: Jian Cai, Xinhui Hu, Yiming Jing, Vishnu Teja Kilari, Bing Li, Liangyue Li, Yashu Liu, Jianqing Liu, Qiang Liu, Yaozhong Song, Yinxin Wan, Siqi Wei, Haiqin Wu, Haitao Xu, Rui Zhang, Ziming Zhao, and Zhuoyang Zhou. Their friendship and care are what have helped me survive over the years. Finally and most importantly, none of my achievements would have been possible without the love and patience from my wife and my family. My most sincere thanks go to my wife Rui Sun, for her endless support and caring over the years. She is the reason, the why, for which I have strived hard in the past and will keep on striving iii in the future. I am very thankful to my parents, Bing Yu and Lianna Xie, for their unconditional and forbearing love and support throughout my life. iv TABLE OF CONTENTS Page LIST OF TABLES . xii LIST OF FIGURES . xiii CHAPTER 1 INTRODUCTION . 1 1.1 Motivation . 1 1.2 Overview . 3 1.3 Summarized Contributions . 5 1.3.1 Part I: Network Resource Allocation in IoT . 5 1.3.2 Part II: Robust Security Deployment in IoT . 8 1.3.3 Part III: Micropayment Routing in Blockchain-based PCN. 9 I NETWORK RESOURCE ALLOCATION IN IOT 2 QOS-AWARE AND RELIABLE TRAFFIC STEERING FOR SERVICE FUNCTION CHAINING IN MOBILE NETWORKS . 13 2.1 Introduction . 13 2.2 Background and Related Work . 16 2.2.1 NFV and SFC. 16 2.2.2 Software-defined Mobile Networks . 17 2.3 System Model . 18 2.3.1 Network Topology . 18 2.3.2 Service Functions . 19 2.3.3 Traffic Model. 20 2.3.4 Feasible Routing Graph . 21 2.3.5 Reliability . 23 v CHAPTER Page 2.4 Problem Statement . 24 2.4.1 Problem Description and Formulation . 24 2.4.2 Computational Complexity . 25 2.4.3 Optimization Formulation . 25 2.5 Fully Polynomial-Time Approximation Scheme . 27 2.5.1 Dual Analysis . 28 2.5.2 Primal-Dual Algorithm . 30 2.5.3 Approximating Shortest Feasible Paths. 32 2.5.4 Algorithm Analysis . 32 2.5.5 Feasibility and Demand Scaling . 35 2.5.6 Extension to Multiple QoS Requirements . 38 2.6 Performance Evaluation. 38 2.6.1 Experiment Settings . 38 2.6.2 Evaluation Results . 40 2.6.2.1 Comparison with theoretical upper bound . 40 2.6.2.2 Comparison with baseline heuristics . 41 2.7 Conclusions . 44 3 PROVISIONING QOS-AWARE AND ROBUST APPLICATIONS IN INTERNET-OF-THINGS: A NETWORK PERSPECTIVE . 46 3.1 Introduction . 46 3.2 Background and Related Work . 49 3.2.1 Internet-of-Things and Fog Computing . 49 3.2.2 Network Service Provisioning . 50 3.2.3 Robustness Applications and Networks . 51 vi CHAPTER Page 3.3 System Model . 52 3.3.1 Infrastructure Model . 52 3.3.2 Application Model . 52 3.3.3 Basic Provisioning Model . 53 3.3.4 Robustness Model . 55 3.3.5 Notations . 57 3.4 Problem Statement and Complexity . 58 3.5 Single-Application Provisioning . 60 3.6 Multi-Application Provisioning . 61 3.6.1 Problem Formulation for PO-MAP . 62 3.6.2 An FPTAS to PO-MAP . 64 3.6.3 NO-MAP Formulation and Randomized Algorithm. 73 3.7 Performance Evaluation. 76 3.7.1 Experiment Settings . 76 3.7.2 Evaluation Results . 78 3.7.2.1 Single-Application Scenario. 78 3.7.2.2 Multi-Application Scenario . 83 3.8 Conclusions . 87 4 LOAD BALANCING FOR INTERDEPENDENT IOT MICROSER- VICES ............................................................ 88 4.1 Introduction . 88 4.2 Background and Related Work . 91 4.2.1 Microservices and Application Graph Models . 91 4.2.2 Application-level Load Balancing . 93 vii CHAPTER Page 4.3 System Model and Basic Formulation . 94 4.3.1 Application Model . 94 4.3.2 Infrastructure Model . 95 4.3.3 Basic Load Balancing Model . 96 4.4 QoS-aware Load Balancing . 98 4.5 Approximation Scheme Design . 103 4.5.1 Pseudo-Polynomial Time Optimal Algorithm . 104 4.5.2 Approximation Scheme for O-QLB . 106 4.5.3 Efficiency Enhancement . 110 4.6 Performance Evaluation. 112 4.7 Conclusions . 116 4.8 Appendix . ..
Recommended publications
  • Mohanoor Ou 0169D 10067.Pdf (1.725Mb)
    UNIVERSITY OF OKLAHOMA GRADUATE COLLEGE DATA GATHERING TECHNIQUES ON WIRELESS SENSOR NETWORKS A DISSERTATION SUBMITTED TO THE GRADUATE FACULTY in partial fulfillment of the requirements for the Degree of DOCTOR OF PHILOSOPHY By ARAVIND MOHANOOR Norman, Oklahoma 2008 DATA GATHERING TECHNIQUES ON WIRELESS SENSOR NETWORKS A DISSERTATION APPROVED FOR THE SCHOOL OF COMPUTER SCIENCE BY _____________________________________ Dr. Sridhar Radhakrishnan, Chair _____________________________________ Dr. S. Lakshmivarahan _____________________________________ Dr. Sudarshan Dhall _____________________________________ Dr. John Antonio _____________________________________ Dr. Marilyn Breen © Copyright by ARAVIND MOHANOOR 2008 All Rights Reserved Acknowledgments I wish to express my sincere gratitude to my dissertation advisor Dr. Sridhar Radhakrishnan for his guidance and inspiration without which this work would have been impossible. His constant enthusiasm and support was a big factor in my persisting through the many peaks and troughs which are commonplace during graduate studies. It is fair to say that I learnt much from him about research as well as life. I would like to express my gratitude to my committee members Dr. S. Lakshmivarahan, Dr. Sudarshan Dhall, Dr. John Antonio and Dr. Marilyn Breen for serving on my dissertation committee. I would also like to thank Dr. Venkatesh Sarangan of Oklahoma State University for many interesting discussions about research and for helping me introduce rigor to my approach to research writing. I would like to express many thanks to Dr. Henry Neeman for a very stimulating and enjoyable experience as a Teaching Assistant for CS 1313. I would also like to express thanks to Dr. Shivakumar Raman for the financial support during the last year of my doctoral studies.
    [Show full text]
  • Acyclic Graphs, Trees and Spanning Trees
    Acyclic graphs, trees and spanning trees Stanislav Pal´uch Fakulta riadenia a informatiky, Zilinsk´auniverzitaˇ 20. apr´ıla 2016 Stanislav Pal´uch, Fakulta riadenia a informatiky, Zilinsk´auniverzitaˇ Acyclic graphs, trees and spanning trees 1/21 Opakovanie – Cyklus Definition Cycle (directed cycle, quasi-cycle) is non trivial closed walk (directed walk, quasi-walk) in which every vertex but the first and the last appears at most once. Stanislav Pal´uch, Fakulta riadenia a informatiky, Zilinsk´auniverzitaˇ Acyclic graphs, trees and spanning trees 2/21 Acyklic graph and tree Definition An acyclic graph is a graph that has no cycles. Definition A tree is a connected acyclic graph. Remark Trivial graph is a tree. Remark Every component of an acyclic graph is a tree (is connected and dous not contain a cycle). Hence an acyclic graph can be considered as several trees. That is why the term forest is often used as a synonym for acyclic graph“. ” Stanislav Pal´uch, Fakulta riadenia a informatiky, Zilinsk´auniverzitaˇ Acyclic graphs, trees and spanning trees 3/21 Acyklic graph and tree Definition An acyclic graph is a graph that has no cycles. Definition A tree is a connected acyclic graph. Remark Trivial graph is a tree. Remark Every component of an acyclic graph is a tree (is connected and dous not contain a cycle). Hence an acyclic graph can be considered as several trees. That is why the term forest is often used as a synonym for acyclic graph“. ” Stanislav Pal´uch, Fakulta riadenia a informatiky, Zilinsk´auniverzitaˇ Acyclic graphs, trees and spanning trees 3/21 Acyklic graph and tree Definition An acyclic graph is a graph that has no cycles.
    [Show full text]
  • Open THESIS PPPP Revjul27.Pdf
    The Pennsylvania State University The Graduate School School of Science, Engineering, and Technology CAFFEINE: CONGESTION AVOIDANCE FOR FAIRNESS & EFFICIENCY IN NETWORK ENTITIES A Thesis in Computer Science by Pattanapoom Phinjirapong ©2015 Pattanapoom Phinjirapong Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Science August 2015 ii The thesis of Pattanapoom Phinjirapong was reviewed and approved* by the following: Jeremy J. Blum Associate Professor of Computer Science Thesis Advisor Thang N. Bui Associate Professor of Computer Science Chair, Mathematics and Computer Science Programs Sukmoon Chang Associate Professor of Computer Science Omar El Ariss Assistant Professor of Computer Science Linda M. Null Associate Professor of Computer Science Associate Chair, Mathematics and Computer Science Programs *Signatures are on file in the Graduate School. iii Abstract Software Defined Networking (SDN) enables the separation of the data forwarding plane and the control plane in network switches and routers. The control plane functionality is provided by a centralized network operating system. By moving this functionality to software, a range of new capabilities are possible in networks. This thesis describes and evaluates a new algorithm, called Congestion Avoidance For Fairness & Efficiency In Network Entities (CAFFEINE) that uses SDN provided capabilities. CAFFEINE provides dynamic routing in network topology for long-lived network traffic with goals of fully utilizing network capacity and maintaining fairness among traffic classes through Quality of Service (QoS) guarantees. CAFFEINE is designed to spread these long-lived traffic flows throughout an organization’s network. To achieve the goals, CAFFEINE periodically polls network devices in order to monitor the current network state.
    [Show full text]
  • Graph Algorithms
    Graph Algorithms PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Wed, 29 Aug 2012 18:41:05 UTC Contents Articles Introduction 1 Graph theory 1 Glossary of graph theory 8 Undirected graphs 19 Directed graphs 26 Directed acyclic graphs 28 Computer representations of graphs 32 Adjacency list 35 Adjacency matrix 37 Implicit graph 40 Graph exploration and vertex ordering 44 Depth-first search 44 Breadth-first search 49 Lexicographic breadth-first search 52 Iterative deepening depth-first search 54 Topological sorting 57 Application: Dependency graphs 60 Connectivity of undirected graphs 62 Connected components 62 Edge connectivity 64 Vertex connectivity 65 Menger's theorems on edge and vertex connectivity 66 Ear decomposition 67 Algorithms for 2-edge-connected components 70 Algorithms for 2-vertex-connected components 72 Algorithms for 3-vertex-connected components 73 Karger's algorithm for general vertex connectivity 76 Connectivity of directed graphs 82 Strongly connected components 82 Tarjan's strongly connected components algorithm 83 Path-based strong component algorithm 86 Kosaraju's strongly connected components algorithm 87 Application: 2-satisfiability 88 Shortest paths 101 Shortest path problem 101 Dijkstra's algorithm for single-source shortest paths with positive edge lengths 106 Bellman–Ford algorithm for single-source shortest paths allowing negative edge lengths 112 Johnson's algorithm for all-pairs shortest paths in sparse graphs 115 Floyd–Warshall algorithm
    [Show full text]
  • On Stability of Widest Path in Network Routing Abstract
    Journal of Advances in Mathematics and Computer Science 23(6): 1-10, 2017; Article no.JAMCS.35358 Previously known as British Journal of Mathematics & Computer Science ISSN: 2231-0851 On Stability of Widest Path in Network Routing ∗ Ahmad Hosseini1 and Bita Kabir Baiki1 1East Institute of Science and Technology, Tehran, Iran. Authors’ contributions This work was carried out in collaboration between both authors. Author AH designed the study, performed the statistical analysis, wrote the protocol and wrote the first draft of the manuscript. Author BKB managed the analysis of the study and the literature search. Both authors read and approved the final manuscript. Article Information DOI: 10.9734/JAMCS/2017/35358 Editor(s): (1) Qiankun Song, Department of Mathematics, Chongqing Jiaotong University, China. Reviewers: (1) S. K. Srivatsa, Retired, Anna University, India. (2) Vaishali D. Khairnar, TEC Under Mumbai University, India. (3) Zheng Zhao, Zhengzhou Science and Technology Institute, China. Complete Peer review History: http://www.sciencedomain.org/review-history/20393 Received: 9th July 2017 Accepted: 30th July 2017 Original Research Article Published: 5th August 2017 Abstract The problem of widest path (WP) is a well-established topic in network routing and digital compositing. This paper contemplates one facet of the robustness of optimal solutions to the widest path; i.e., stability analysis of the WP problem. The study here deals with infimum and supremum perturbations which determine multiplicative changes each individual arc can tolerate conserving the optimality of a given WP. It is additionally illustrated how to determine these marginal values for all arcs, and an algorithm for computing all such values is proposed.
    [Show full text]
  • Artistic Recoloring of Image Oversegmentations
    Artistic Recoloring of Image Oversegmentations Rosa Azami* David Mould† Carleton University Carleton University Figure 1: Recoloring of region-based abstraction. The original image is on the left; on the right, we show results from our method using three different palettes. ABSTRACT We propose a method to assign vivid colors to regions of an oversegmented image. We restrict the output colors to those found in an input palette, and seek to preserve the recognizability of structure in the image. Our strategy is to match the color distances between the colors of adjacent regions with the color differences between the assigned palette colors; thus, assigned colors may be very far from the original colors, but both large local differences (edges) and small ones (uniform areas) are maintained. We use the widest path algorithm on a graph-based structure to obtain a Figure 2: Colorful representational images. A modern vector illustration of a spanning tree over the set of regions, then traverse the tree to assign lion; a Fauvist painting by Andre´ Derain; an abstraction of the Eiffel Tower colors in a greedy fashion. Our method produces vivid recolorings by Robert Delaunay. of region-based abstraction using arbitrary palettes. We demonstrate a set of stylizations that can be generated by our algorithm. Manual recoloring of oversegmented images would be tedious. Keywords: Non-photorealistic rendering, Image stylization, Recol- The images contain hundreds or thousands of segments; clicking oring, Abstraction. on every segment would take a long time, even leaving aside the cognitive and interaction overhead of making selections from the Index Terms: I.3.3 [Picture/Image Generation]—; I.4.6 [Segmen- palette.
    [Show full text]
  • Fundamental Data Structures Zuyd Hogeschool, ICT Contents
    Fundamental Data Structures Zuyd Hogeschool, ICT Contents 1 Introduction 1 1.1 Abstract data type ........................................... 1 1.1.1 Examples ........................................... 1 1.1.2 Introduction .......................................... 2 1.1.3 Defining an abstract data type ................................. 2 1.1.4 Advantages of abstract data typing .............................. 5 1.1.5 Typical operations ...................................... 5 1.1.6 Examples ........................................... 6 1.1.7 Implementation ........................................ 7 1.1.8 See also ............................................ 8 1.1.9 Notes ............................................. 8 1.1.10 References .......................................... 8 1.1.11 Further ............................................ 9 1.1.12 External links ......................................... 9 1.2 Data structure ............................................. 9 1.2.1 Overview ........................................... 10 1.2.2 Examples ........................................... 10 1.2.3 Language support ....................................... 11 1.2.4 See also ............................................ 11 1.2.5 References .......................................... 11 1.2.6 Further reading ........................................ 11 1.2.7 External links ......................................... 12 2 Sequences 13 2.1 Array data type ............................................ 13 2.1.1 History ...........................................
    [Show full text]
  • Fahmy Layout
    THIRD QUARTER 2003, VOLUME 5, NO. 1 IEEE COMMUNICATIONS SURVEYS The Electronic Magazine of Original Peer-Reviewed Survey Articles www.comsoc.org/pubs/surveys CONSTRAINT-BASED ROUTING IN THE INTERNET: BASIC PRINCIPLES AND RECENT RESEARCH OSSAMA YOUNIS AND SONIA FAHMY, PURDUE UNIVERSITY ABSTRACT Novel routing paradigms based on policies, quality of service (QoS) requirements, and packet content have been proposed for the Internet over the last decade. Constraint-based routing algorithms select a routing path satisfying constraints that are either administrative-oriented (policy routing) or service-oriented (QoS routing). The routes, in addition to satisfying constraints, are selected to reduce costs, balance network load, or increase security. In this article, we discuss several constraint-based routing approaches and explain their requirements, complexity, and recent research proposals. In addition, we illustrate how these approaches can be integrated with Internet label switching and QoS architectures. We also discuss examples of application-level routing techniques used in today’s Internet. ith the proliferation of Web and multimedia ser- CBR reduces the manual configuration and intervention vices, and virtual private networks (VPNs) con- required for realizing traffic engineering objectives [2]. The necting corporate sites, more-versatile Internet ultimate objective of CBR is to enable a new routing paradigm Wrouting protocols have become critical. Current Internet pack- with special properties, such as being resource reservation- et forwarding is based on the destination address. Simple aware and demand-driven, to be merged with current routing routing algorithms that determine forwarding paths based on protocols. The resource availability information required to the minimum number of hops or delay to a specified destina- make CBR decisions is exchanged via routing protocol exten- tion are no longer sufficient.
    [Show full text]
  • Arxiv:2105.05371V1 [Cs.DM] 11 May 2021 Total Investment Cost, the Return on the Investment)
    A Stronger Lower Bound on Parametric Minimum Spanning Trees David Eppstein Computer Science Department, University of California, Irvine Abstract. We prove that, for an undirected graph with n vertices and m edges, each labeled with a linear function of a parameter λ, the number of different minimum spanning trees obtained as the parameter varies can be Ω(m log n). 1 Introduction In the parametric minimum spanning tree problem [16], the input is a graph G whose edges are labeled with linear functions of a parameter λ. For any value of λ, one can obtain a spanning tree Tλ as the minimum spanning tree of the weight functions, evaluated at λ. Varying λ continuously from −∞ to 1 produces in this way a discrete sequence of trees, each of which is minimum within some range of values of λ. How many different spanning trees can belong to this sequence, for a worst case graph, and how can we construct them all efficiently? Known bounds are that the number of trees in a graph with n vertices and m edges can be Ωmα(n) (where α is the inverse Ackermann function) [9] and is always O(mn1=3) [7]; both bounds date from the 1990s and, although far apart, have not been improved since. The sequence of trees can be constructed in time O(mn log n) [13] or in time O(n2=3 logO(1) n) per tree [1]; faster algorithms are also known for planar graphs [12] or for related optimization problems that construct only a single tree in the parametric sequence [6, 19].
    [Show full text]
  • Fine-Grained Complexity and Algorithms for the Schulze Voting Method*
    Fine-Grained Complexity and Algorithms for the Schulze Voting Method* Krzysztof Sornat†1, Virginia Vassilevska Williams‡1, and Yinzhan Xu§1 1MIT CSAIL, USA Abstract We study computational aspects of a well-known single-winner voting rule called the Schulze method [Schulze, 2003] which is used broadly in practice. In this method the voters give (weak) ordinal prefer- ence ballots which are used to define the weighted majority graph of direct comparisons between pairs of candidates. The choice of the winner comes from indirect comparisons in the graph, and more specifically from considering directed paths instead of direct comparisons between candidates. When the input is the weighted majority graph, to our knowledge, the fastest algorithm for comput- ing all winners in the Schulze method uses a folklore reduction to the All-Pairs Bottleneck Paths (APBP) problem and runs in (m2:69) time, where m is the number of candidates. It is an interesting open ques- tion whether this canO be improved. Our first result is a combinatorial algorithm with a nearly quadratic running time for computing all winners. This running time is essentially optimal as it is nearly linear in the size of the weighted majority graph. If the input to the Schulze winners problem is not the weighted majority graph but the preference profile, then constructing the weighted majority graph is a bottleneck that increases the running time significantly; in the special case when there are m candidates and n = (m) voters, the running time is O (m2:69), or (m2:5) if there is a nearly-linear time algorithm for multiplying dense square matrices.
    [Show full text]
  • Many Objective Sequential Decision Making
    Many Objective Sequential Decision Making by Bentz P. Tozer III B.S. in Computer Engineering, December 2003, University of Pittsburgh M.S. in Electrical and Computer Engineering, May 2007, Johns Hopkins University A Dissertation submitted to The Faculty of The School of Engineering and Applied Science of The George Washington University in partial satisfaction of the requirements for the degree of Doctor of Philosophy May 21, 2017 Dissertation directed by Thomas A. Mazzuchi Professor of Engineering Management and Systems Engineering Shahram Sarkani Professor of Engineering Management and Systems Engineering The School of Engineering and Applied Science of The George Washington University certifies that Bentz P. Tozer III has passed the Final Examination for the degree of Doctor of Philosophy as of November 30, 2016. This is the final and approved form of the dissertation. Many Objective Sequential Decision Making Bentz P. Tozer III Dissertation Research Committee: Thomas A. Mazzuchi, Professor of Engineering Management and Systems Engineering & of Decision Sciences, Dissertation Co-Director Shahram Sarkani, Professor of Engineering Management and Systems Engineering, Dissertation Co-Director Chris Willy, Professorial Lecturer in Engineering Management and Systems Engineering, Committee Member Royce Francis, Assistant Professor of Engineering Management and Systems Engineering, Committee Member E. Lile Murphree, Professor Emeritus of Engineering Management and Systems Engineering, Committee Member ii c Copyright 2017 by Bentz P. Tozer III All rights reserved iii Dedication Dedicated to Audrey, who provided much of the motivation and inspiration necessary to complete this dissertation. iv Acknowledgments This dissertation would not be possible without the support of many people through- out my life, starting with my family.
    [Show full text]
  • Comparitive Analysis on Shortest Path Computation in Gps Systems
    www.ijcrt.org © 2020 IJCRT | Volume 8, Issue 9 September 2020 | ISSN: 2320-2882 COMPARITIVE ANALYSIS ON SHORTEST PATH COMPUTATION IN GPS SYSTEMS Sen Oommen James1, Dr. Anjana S Chandran2 1Scholar, SCMS, Cochin, Kerala, India, 2 Assistant Professor, SCMS, Cochin, Kerala, India, Abstract: Distributed computing is a field of computer science that deals with the computation of distributed systems. The use of concurrent processes which was communicated by the process of message-passing has their own developments in operating system architectures. This paper discusses the results of monitoring, comparing and analyzing various algorithms which are used to find the shortest path between two locations in a GPS technology. The results are based on comparing various factors such as CPU utilization, CPU load, RAM utilization, network load, accuracy of the model and cross entropy value. The results are then discussed for various insights that are obtained over the course of this project. Keywords:GPS,GlobalPositioningSystem CPU,Centralprocessingunit RAM,Randomaccessmemory 1. Introduction and Background Study Distributed systems are by now very common, yet remains a difficult area of research. The results of new technologies coming up is that it's not only feasible, but easy, to hold together a computer system packed of multiple network computers, be they too large or too small. These computers are generally geographically dispersed, that reason they're usually said to make a distributed system. The size of a distributed system may vary from a couple of devices, to many computers. The interconnection network could also be wired, wireless, or a mixture of both. Moreover, distributed systems are often highly dynamic, within the sense that computers can join and leave, with the topology and performance of the underlying network almost continuously changing.
    [Show full text]