CEDAR: a Core-Extraction Distributed Ad Hoc Routing Algorithm Prasun Sinha Raghupathy Sivakumar Vaduvur Bharghavan

Total Page:16

File Type:pdf, Size:1020Kb

CEDAR: a Core-Extraction Distributed Ad Hoc Routing Algorithm Prasun Sinha Raghupathy Sivakumar Vaduvur Bharghavan CEDAR: a Core-Extraction Distributed Ad hoc Routing algorithm Prasun Sinha Raghupathy Sivakumar Vaduvur Bharghavan University of Illinois at Urbana-Champaign g Email:fprasun, sivakumr, bharghav @timely.crhc.uiuc.edu Abstract—CEDAR is an algorithm for QoS routing in ad hoc network en- by propagating the bandwidth availability information of vironments. It has three key components: (a) the establishment and main- stable links in the core graph. The basic idea is that the in- tenance of a self-organizing routing infrastructure called the core for per- forming route computations, (b) the propagation of the link-state of stable formation about stable high-bandwidth links can be made high-bandwidth links in the core through increase/decrease waves, and (c) a known to nodes far away in the network, while information QoS route computation algorithm that is executed at the core nodes using about dynamic links or low bandwidth links should remain only locally available state. local. Slow-moving increase waves and fast moving de- Our preliminary performance evaluation shows that CEDAR is a robust and adaptive QoS routing algorithm that reacts effectively to the dynamics crease waves which denote corresponding changes in avail- of the network while still approximating link-state performance for stable able bandwidths on links, are used to propogate non-local networks. information over core nodes. Keywords—Ad hoc routing, QoS routing inftro.tex Route computation: Route computation first establishes a core path from the dominator (See Section II) of the source I. INTRODUCTION to that of the destination. The core path provides the direc- An ad hoc network is a dynamic multi-hop wireless network tionality of the route from the source to the destination. Us- that is established by a group of mobile hosts on a shared wire- ing this directional information, CEDAR iteratively tries to less channel by virtue of their proximity to each other. Ad hoc find a partial route from the source to the domain of the fur- core networks find applicability in military environments, wherein a thest possible node in the path (which then becomes platoon of soldiers or a fleet of ships may establish an ad hoc net- the source for the next iteration) satisfying the requested work in the region of their deployment. Military network envi- bandwidth, using only local information. Effectively, the ronments typically require quality of service for their mission- computed route is a shortest-widest furthest path using the core critical applications. Hence, the focus of this paper is to provide path as the guideline. quality of service routing in ad hoc networks. The rest of this paper is organized as follows. Section II de- Ad hoc networks are dynamic in nature, and transmissions scribes the network model and terminology used in the paper. are susceptible to fades, interference, and collisions from hid- Section III describes the computation and dynamic management den/exposed stations. These characteristics make it a challeng- of the core of the network. Section IV describes link state propa- ing task to design a QoS routing algorithm for ad hoc networks. gation through the core using increase and decrease waves. Sec- Following are the main design goals for such an algorithm: tion V describes the route computation algorithm of CEDAR, 1. The algorithm should be highly robust and should degrade and puts together the algorithms described in the previous sec- gracefully with increasing mobility. tions. Section VI analyzes the performance of CEDAR through 2. Route computation should not require maintenance of simulations and Section VII summarizes the paper. global information. 3. The computed route should be highly likely to sustain the II. NETWORK MODEL AND TERMINOLOGY requested bandwidth for the flow. We assume that all the hosts communicate on the same shared 4. The route computation should involve only a few hosts as wireless channel. Neighborhoodis assumed to be a commutative broadcast in the whole network is expensive. B B A property (i.e. if A can hear , then can hear ). Because of 5. Hosts should have quick access to routes when connections the local nature of transmissions, hidden and exposed stations need to be established. abound in an ad hoc network. We assume the use of a CSMA/CA We propose CEDAR as a QoS routing algorithm, which like algorithm such as MACAW [1] for reliable unicast commu- achieves the above design goals for small to medium size ad hoc nication, and for solving the problem of hidden/exposed stations. networks consisting of tens to hundreds of nodes. The following Essentially, data transmission is preceded by a control packet is a brief description of the three key components of CEDAR. handoff, and the sequence of packets exchanged in a commu- Core extraction: A set of hosts is distributedly and dynam- nication is the following: RTS (from sender to receiver) - CTS ically elected to form the core of the network by approx- (from receiver to sender) - Data (from sender to receiver) - ACK imating a minimum dominating set of the ad hoc network using only local computation and local state. Each core host A shortest widest path is the maximum bandwidth path. If there are several maintains the local topology of the hosts in its domain, and such paths, it is the one with the least number of hops. A hidden station is a host that is within the range of the receiver but not the also performs route computation on behalf of these hosts. transmitter, while an exposed station is within the range of the transmitter but not Link state propagation: QoS routing in CEDAR is achieved the receiver. 1 (from receiver to sender). Local data broadcasts are not assumed 2. Local broadcasts are highly unreliable in ad hoc networks to be reliable. due to the abundance of hidden and exposed stations. We assume that each host can estimate the available band- Topology information propagation [4] and route probes [2], width using some link-level mechanisms. We also assume a [3] are inevitable in order to establish routes and will, of ne- close coordination between the MAC and routing layers is as- cessity, need to be broadcast if every node performs route sumed. In particular, reception of RTS and CTS control mes- computation. While the adverse effects of unreliable broad- sages at the MAC layer is used to improve the behavior of the casts are typically not considered in most of the related routing layer, as explained in Section III. work on ad hoc routing, we have observed that flooding in We represent the ad hoc network by means of an undirected ad hoc networks is highly lossy [5]. On the other hand, if V E V graph G , where is the set of nodes in the graph (hosts only a core subset of nodes in the ad hoc network perform in the network), and E is the set of edges in the graph (links in route computations, it is possible to set up reliable unicast th i N x x the network). The i open neighborhood, of node is the channels between nearby core nodes and accomplish both i set of nodes whose distance from x is not greater than , except the topology updates and route probes much more effec- th i i N x x node x itself. The closed neighborhood of node is tively. i fxg N . The issues with having only a core subset of nodes performing V V A dominating set S is a set such that every node in route computations are threefold. First, nodes in the ad hoc net- S is either in S or is a neighbor of a node in . A dominating set work that do not perform route computation must have easy ac- with minimum cardinality is called a minimum dominating set cess to a nearby core node so that they can quickly request routes (MDS). Also, every node not in S chooses one of its neighbors to be set up. Second, the establishment of the core must be a u v who is in S as its dominator.Avirtual link between two purely local computation. In particular, no core node must need G u v nodes in the dominating set S is a path in from to . We use to know the topology of the entire core graph. Third, a change the term tunnel interchangeably with virtual link in our discus- in the network topology may cause a recomputation of the core sions. graph. Recomputation of the core graph must only occur in the locality of the topology change, and must not involve a global re- V G Given an MDS C of graph , we define a core of the graph computation of the core graph. On the other hand, the locally re- C V E E fu v j u V v V u C C C C C , where computed core graph must still only comprise of a small number V N v g . Thus, the core graph consists of the MDS nodes C , of core nodes - otherwise the benefit of restricting route compu- V and a set of virtual links between every two nodes in C that are tation to a small core graph is lost. Our core computation algo- u v within a distance 3 of each other in G. Two nodes and which rithm satisfies the above requirements. u v have a virtual link in the core are said to be nearby nodes. Thus, from the definition of the core,ifG is connected, then a B. Generation and Maintenance of the Core in CEDAR G core C of must also be connected (via virtual links). Ideally, the core comprises of the nodes in a minimum domi- G V E RCHITECTURE AND THE ORE V III.
Recommended publications
  • Daily Eastern News: August 27, 2018 Eastern Illinois University
    Eastern Illinois University The Keep August 2018 8-27-2018 Daily Eastern News: August 27, 2018 Eastern Illinois University Follow this and additional works at: https://thekeep.eiu.edu/den_2018_aug Recommended Citation Eastern Illinois University, "Daily Eastern News: August 27, 2018" (2018). August. 7. https://thekeep.eiu.edu/den_2018_aug/7 This Book is brought to you for free and open access by the 2018 at The Keep. It has been accepted for inclusion in August by an authorized administrator of The Keep. For more information, please contact [email protected]. HOUSING AND DINING VOLLEYBALL RECORD Eastern’s housing and dining staff work with students to establish a smooth start Eastern’s volleyball team had a 2-2 record this past weekend, finishing to the semester. the Panther Invitational in third place. PAGE 3 PAGE 8 HE T Monday, August 27,aily 2018 astErn Ews D E“TELL THE TRUTH AND DON’T BE AFRAID” n VOL. 103 | NO. 6 CELEBRATING A CENTURY OF COVERAGE EST. 1915 WWW.DAILYEASTERNNEWS.COM Phishy business: Students receive spam from people they know Staff Report | @DEN_News Beneath the green box there is more text that states the “message has been delayed” and Phishing emails and spam have been sent gives a date. to several students with a panthermail email Josh Reinhart, Eastern’s public informa- address from people they know Sunday night. tion coordinator, said the emails might have The emails contain a subject line that re- reached a sizeable population of people with lates to the person receiving the email, and an [email protected] email address.
    [Show full text]
  • Downbeat.Com April 2011 U.K. £3.50
    £3.50 £3.50 U.K. PRIL 2011 DOWNBEAT.COM A D OW N B E AT MARSALIS FAMILY // WOMEN IN JAZZ // KURT ELLING // BENNY GREEN // BRASS SCHOOL APRIL 2011 APRIL 2011 VOLume 78 – NumbeR 4 President Kevin Maher Publisher Frank Alkyer Editor Ed Enright Associate Editor Aaron Cohen Art Director Ara Tirado Production Associate Andy Williams Bookkeeper Margaret Stevens Circulation Manager Sue Mahal Circulation Associate Maureen Flaherty ADVERTISING SALES Record Companies & Schools Jennifer Ruban-Gentile 630-941-2030 [email protected] Musical Instruments & East Coast Schools Ritche Deraney 201-445-6260 [email protected] Classified Advertising Sales Sue Mahal 630-941-2030 [email protected] OFFICES 102 N. Haven Road Elmhurst, IL 60126–2970 630-941-2030 Fax: 630-941-3210 http://downbeat.com [email protected] CUSTOMER SERVICE 877-904-5299 [email protected] CONTRIBUTORS Senior Contributors: Michael Bourne, John McDonough, Howard Mandel Atlanta: Jon Ross; Austin: Michael Point, Kevin Whitehead; Boston: Fred Bouchard, Frank-John Hadley; Chicago: John Corbett, Alain Drouot, Michael Jackson, Peter Margasak, Bill Meyer, Mitch Myers, Paul Natkin, Howard Reich; Denver: Norman Provizer; Indiana: Mark Sheldon; Iowa: Will Smith; Los Angeles: Earl Gibson, Todd Jenkins, Kirk Silsbee, Chris Walker, Joe Woodard; Michigan: John Ephland; Minneapolis: Robin James; Nashville: Robert Doerschuk; New Orleans: Erika Goldring, David Kunian, Jennifer Odell; New York: Alan Bergman, Herb Boyd, Bill Douthart, Ira Gitler, Eugene Gologursky, Norm Harris, D.D. Jackson, Jimmy Katz,
    [Show full text]
  • IV. Fabric Summary 282 Copyrighted Material
    Eastern State Penitentiary HSR: IV. Fabric Summary 282 IV. FABRIC SUMMARY: CONSTRUCTION, ALTERATIONS, AND USES OF SPACE (for documentation, see Appendices A and B, by date, and C, by location) Jeffrey A. Cohen § A. Front Building (figs. C3.1 - C3.19) Work began in the 1823 building season, following the commencement of the perimeter walls and preceding that of the cellblocks. In August 1824 all the active stonecutters were employed cutting stones for the front building, though others were idled by a shortage of stone. Twenty-foot walls to the north were added in the 1826 season bounding the warden's yard and the keepers' yard. Construction of the center, the first three wings, the front building and the perimeter walls were largely complete when the building commissioners turned the building over to the Board of Inspectors in July 1829. The half of the building east of the gateway held the residential apartments of the warden. The west side initially had the kitchen, bakery, and other service functions in the basement, apartments for the keepers and a corner meeting room for the inspectors on the main floor, and infirmary rooms on the upper story. The latter were used at first, but in September 1831 the physician criticized their distant location and lack of effective separation, preferring that certain cells in each block be set aside for the sick. By the time Demetz and Blouet visited, about 1836, ill prisoners were separated rather than being placed in a common infirmary, and plans were afoot for a group of cells for the sick, with doors left ajar like others.
    [Show full text]
  • Cultural & Heritagetourism
    Cultural & HeritageTourism a Handbook for Community Champions A publication of: The Federal-Provincial-Territorial Ministers’ Table on Culture and Heritage (FPT) Table of Contents The views presented here reflect the Acknowledgements 2 Section B – Planning for Cultural/Heritage Tourism 32 opinions of the authors, and do not How to Use this Handbook 3 5. Plan for a Community-Based Cultural/Heritage Tourism Destination ������������������������������������������������ 32 necessarily represent the official posi- 5�1 Understand the Planning Process ������������������������������������������������������������������������������� 32 tion of the Provinces and Territories Developed for Community “Champions” ��������������������������������������� 3 which supported the project: Handbook Organization ����������������������������������������������������� 3 5�2 Get Ready for Visitors ����������������������������������������������������������������������������������������� 33 Showcase Studies ���������������������������������������������������������� 4 Alberta Showcase: Head-Smashed-In Buffalo Jump and the Fort Museum of the NWMP Develop Aboriginal Partnerships ��� 34 Learn More… �������������������������������������������������������������� 4 5�3 Assess Your Potential (Baseline Surveys and Inventory) ������������������������������������������������������������� 37 6. Prepare Your People �������������������������������������������������������������������������������������������� 41 Section A – Why Cultural/Heritage Tourism is Important 5 6�1 Welcome
    [Show full text]
  • Æ‚‰É​”·È​¯Çˆ¾é “ Éÿ³æ¨‚Å°ˆè¼¯ ĸ²È¡Œ (ĸ“Ⱦ
    悉é”​ ·è¯​ çˆ¾é “ 音樂專輯 串行 (专辑 & æ—¶é— ´è¡¨) Spectrum https://zh.listvote.com/lists/music/albums/spectrum-7575264/songs The Electric Boogaloo Song https://zh.listvote.com/lists/music/albums/the-electric-boogaloo-song-7731707/songs Soundscapes https://zh.listvote.com/lists/music/albums/soundscapes-19896095/songs Breakthrough! https://zh.listvote.com/lists/music/albums/breakthrough%21-4959667/songs Beyond Mobius https://zh.listvote.com/lists/music/albums/beyond-mobius-19873379/songs The Pentagon https://zh.listvote.com/lists/music/albums/the-pentagon-17061976/songs Composer https://zh.listvote.com/lists/music/albums/composer-19879540/songs Roots https://zh.listvote.com/lists/music/albums/roots-19895558/songs Cedar! https://zh.listvote.com/lists/music/albums/cedar%21-5056554/songs The Bouncer https://zh.listvote.com/lists/music/albums/the-bouncer-19873760/songs Animation https://zh.listvote.com/lists/music/albums/animation-19872363/songs Duo https://zh.listvote.com/lists/music/albums/duo-30603418/songs The Maestro https://zh.listvote.com/lists/music/albums/the-maestro-19894142/songs Voices Deep Within https://zh.listvote.com/lists/music/albums/voices-deep-within-19898170/songs Midnight Waltz https://zh.listvote.com/lists/music/albums/midnight-waltz-19894330/songs One Flight Down https://zh.listvote.com/lists/music/albums/one-flight-down-20813825/songs Manhattan Afternoon https://zh.listvote.com/lists/music/albums/manhattan-afternoon-19894199/songs Soul Cycle https://zh.listvote.com/lists/music/albums/soul-cycle-7564199/songs
    [Show full text]
  • Machine Learning of Symbolic Compositional Rules with Genetic Programming: Dissonance Treatment in Palestrina
    A peer-reviewed version of this preprint was published in PeerJ on 16 December 2019. View the peer-reviewed version (peerj.com/articles/cs-244), which is the preferred citable publication unless you specifically need to cite this preprint. Anders T, Inden B. 2019. Machine learning of symbolic compositional rules with genetic programming: dissonance treatment in Palestrina. PeerJ Computer Science 5:e244 https://doi.org/10.7717/peerj-cs.244 Machine learning of symbolic compositional rules with genetic programming: Dissonance treatment in Palestrina Torsten Anders 1 , Benjamin Inden Corresp. 2 1 School of Media Arts and Performance, University of Bedfordshire, Luton, Bedfordshire, United Kingdom 2 Department of Computer Science and Technology, Nottingham Trent University Corresponding Author: Benjamin Inden Email address: [email protected] We describe a method to automatically extract symbolic compositional rules from music corpora that can be combined with each other and manually programmed rules for algorithmic composition, and some preliminary results of applying that method. As machine learning technique we chose genetic programming, because it is capable of learning formula consisting of both logic and numeric relations. Genetic programming was never used for this purpose to our knowledge. We therefore investigate a well understood case in this pilot study: the dissonance treatment in Palestrina’s music. We label dissonances with a custom algorithm, automatically cluster melodic fragments with labelled dissonances into different dissonance categories (passing tone, suspension etc.) with the DBSCAN algorithm, and then learn rules describing the dissonance treatment of each category with genetic programming. As positive examples we use dissonances from a given category.
    [Show full text]
  • (A) Data in the Life: Authorship Attribution of Lennon-Mccartney Songs
    (A) Data in the Life: Authorship Attribution of Lennon-McCartney Songs Mark E. Glickman∗ Department of Statistics Harvard University [email protected] Jason I. Brown Department of Mathematics and Statistics Dalhousie University [email protected] Ryan B. Song School of Engineering and Applied Sciences Harvard University [email protected] Abstract The songwriting duo of John Lennon and Paul McCartney, the two founding mem- bers of the Beatles, composed some of the most popular and memorable songs of the last century. Despite having authored songs under the joint credit agreement of arXiv:1906.05427v1 [cs.SD] 12 Jun 2019 Lennon-McCartney, it is well-documented that most of their songs or portions of songs were primarily written by exactly one of the two. Furthermore, the authorship of some Lennon-McCartney songs is in dispute, with the recollections of authorship based on previous interviews with Lennon and McCartney in conflict. For Lennon-McCartney songs of known and unknown authorship written and recorded over the period 1962-66, we extracted musical features from each song or song portion. These features consist of the occurrence of melodic notes, chords, melodic note pairs, chord change pairs, and four-note melody contours. We developed a prediction model based on variable ∗Address for correspondence: Department of Statistics, Harvard University, 1 Oxford Street, Cambridge, MA 02138, USA. E-mail address: [email protected]. Jason Brown is supported by NSERC grant RGPIN 170450-2013. The authors would like to thank Xiao-Li Meng, Michael Jordan, David C. Hoaglin, and the three anonymous referees for their helpful comments.
    [Show full text]
  • Cultural & Heritage Tourism: a Handbook for Community Champions
    Cultural & HeritageTourism a Handbook for Community Champions Table of Contents The views presented here reflect the Acknowledgements 2 opinions of the authors, and do not How to Use this Handbook 3 necessarily represent the official posi- tion of the Provinces and Territories Developed for Community “Champions” ��������������������������������������� 3 which supported the project: Handbook Organization ����������������������������������������������������� 3 Showcase Studies ���������������������������������������������������������� 4 Learn More… �������������������������������������������������������������� 4 Section A – Why Cultural/Heritage Tourism is Important 5 1. Cultural/Heritage Tourism and Your Community ��������������������������� 5 1�1 Treasuring Our Past, Looking To the Future �������������������������������� 5 1�2 Considering the Fit for Your Community ���������������������������������� 6 2. Defining Cultural/Heritage Tourism ��������������������������������������� 7 2�1 The Birth of a New Economy �������������������������������������������� 7 2�2 Defining our Sectors ��������������������������������������������������� 7 2�3 What Can Your Community Offer? �������������������������������������� 10 Yukon Showcase: The Yukon Gold Explorer’s Passport ����������������������� 12 2�4 Benefits: Community Health and Wellness ������������������������������� 14 3. Cultural/Heritage Tourism Visitors: Who Are They? ������������������������ 16 3�1 Canadian Boomers Hit 65 ���������������������������������������������� 16 3�2 Culture as a
    [Show full text]
  • Commonwealth United's 2-Part Blueprint
    ' Commonwealth United’s 2-Part Blueprint: Buy Labels & Publishers ••• Massler Sets Unit For June 22 1968 Kiddie Film ™ ' Features * * * Artists Hit • * * Sound-A-Like Jingl Mercury Ex- iff CashBox pands In Publishing • • Atlantic Sees Confab Sales Peak** 1st Buddah Meet Equals ‘ Begins Pg. 51 RICHARD HARRIS: HE FOUND THE RECIPE Int’l. Section Take a great lyric with a strong beat. Add a voice and style with magic in it. Play it to the saturation level on good music stations Then if it’s really got it, the Top-40 play starts and it starts climbingthe singles charts and selling like a hit. And that’s exactly what Andy’s got with his new single.. «, HONEY Sweet Memories4-44527 ANDY WILLIAMS INCLUDING: THEME FROM "VALLEY OF ^ THE DOLLS" ^ BYTHETIME [A I GETTO PHOENIX ! SCARBOROUGH FAIR LOVE IS BLUE UP UPAND AWAY t THE IMPOSSIBLE * DREAM if His new album has all that Williams magic too. Andy Williams on COLUMBIA RECORDS® *Also available fn A-LikKafia 8-track stereo tape cartridges : VOL. XXIX—Number 47/June 22, 1968 Publication Office / 1780 Broadway, New York, New York 10019 / Telephone: JUdson 6-2640 / Cable Address: Cash Box. N. Y. GEORGE ALBERT President and Publisher MARTY OSTROW Vice President LEON SCHUSTER Treasurer IRV LICHTMAN Editor in Chief EDITORIAL TOM McENTEE Assoc. Editor DANIEL BOTTSTEIN JOHN KLEIN MARV GOODMAN EDITORIAL ASSISTANTS MIKE MARTUCCI When Tragedy Cries (hit ANTHONY LANZETTA ADVERTISING BERNIE BLAKE Director of Advertising ACCOUNT EXECUTIVES STAN SOIFER New York For 'Affirmative'Musif BILL STUPER New York HARVEY GELLER Hollywood WOODY HARDING Art Director COIN MACHINES & VENDING ED ADLUM General Manager BEN JONES Asst.
    [Show full text]
  • A Foundational Approach to Core Music Instruction in Undergraduate Music Theory Based on Common Universal Principles
    A FOUNDATIONAL APPROACH TO CORE MUSIC INSTRUCTION IN UNDERGRADUATE MUSIC THEORY BASED ON COMMON UNIVERSAL PRINCIPLES Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the Graduate School of The Ohio State University By Christy Jo Talbott, B.A., B.S., M.M. The Ohio State University 2008 Dissertation Committee: Gregory M. Proctor, Ph.D., Advisor Approved by Burdette Green, Ph.D. Daniel Avorgbedor, Ph.D. __________________________ Advisor Music Graduate Program Copyright by Christy Jo Talbott 2008 ABSTRACT Music is a large subject with many diverse subcategories (Pop, Classical, Reggae, Jazz, and so on). Each subcategory, classified as a genre for its unique qualities, should relate in some way to that broader subject. These unique properties, however, do not negate all possible relationships among the genres. That these subcategories fit under a “music” label implies that they contain commonalities that transcend their differences. If there is, then, a set of commonalities for this abstract concept of music, then an examination of musics from diverse cultures should illuminate this fact. This “set of commonalities” for a real subject called music should not be limited to the Germanic tradition of the 16th-18th century or to Parisian art song of the 19th but, instead, is open to a world repertoire unbounded by era or nation. Every culture has invented a music of its own. The task here is to show that, from a variety of sources, a basic set of elements is common across cultures. In addition, those elements do not distinguish one category from another but, instead, collectively suggest a set of common principles.
    [Show full text]
  • CALIFORNIA HERE WE COME LOBSTER LOVES RED, WHITE OR BUBBLY ROSÉS PEERLESS PROVENCE GREECE WINES THAT WOW the Cultural Roots of Greek Wine Go Beyond Any in the World
    M AY 2013 30 WINES IN STORES MAY 2 AND 16 CALIFORNIA HERE WE COME LOBSTER LOVES RED, WHITE OR BUBBLY ROSÉS PEERLESS PROVENCE GREECE WINES THAT WOW The cultural roots of Greek wine go beyond any in the world. Along with our dramatically diverse landscape, it’s why we can produce so many distinct wines. Our crisp whites and elegant reds have caught the attention of world’s best chefs and sommeliers. Now, it’s time for them to catch yours. From the oldest vineyards on earth to the most discerning palates in the world PUBLISHER – SAQ ON THE COVER Johanne Morrisseau Three fans of California IN STORES DIRECTOR – SPECIALTY PRODUCTS BUSINESS UNIT – SAQ toast the state and Michel-André St-Jean its wines. CONTRIBUTORS – SAQ MAY 2 AND 16 Robert Bergeron, Liette Chaput, François Couture, Sophie Drouin, Mathieu Fillion, Nathalie Frégeau, François Fortier, Pierre 30 newly arrived products. Lauzon, Martin de Lottinville, Marie-Ève Meunier, Julie Perreault, Isabelle Plante, Justin Rouette, Veronica Ruiz, Alain Smith Médias Transcontinental S.E.N.C. ASSOCIATE PUBLISHER – VICE PRESIDENT, CONSUMER SOLUTIONS Lise Paul-Hus EDITORIAL DIRECTOR CONTENTS MAY 2013 Catherine Elie ART DIRECTOR Renée Grégoire LIFESTYLE CONTENT EDITOR Josée Larivée CALIFORNIA WINE CONSULTANT Marc Chapleau GRECIAN BEAUTIES 6 GOLDEN STATE EDITORIAL STAFF P. 19 Catherine Bergeron, Pascale Navarro ROAD TRIP STYLISTS Touring the must-do wine Heidi Bronstein, Caroline Simon regions of Sonoma, Napa, COPY EDITORS Joan Irving, Donna Jensen Central Coast and Sierra Foothills. TRANSLATOR Felicity Munn PHOTOGRAPHERS GREECE André Doyon, Louise Savoie, Jean Tremblay ART Graphic artists 16 REVELATIONS BY Frédérick Bailleul, Christiane Gauthier Photo coordinator THE GLASSFUL Esther Sainte-Croix Fine and distinctive wines DIGITAL PRE-PRESS SERVICES of unexpected potential.
    [Show full text]
  • Xerox University Microfilms 3 0 0 North Zw B Flood Ann Arbor, Michigan 40106 77-2519 THOMAS, Joseph Edgar, 1934- the KEYBOARD WORKS of JOHANN KRIEGER
    INFORMATION TO USERS This material was produced from a microfilm copy of the original document. While the most advanced technological means to photograph and reproduce this document have been used, the quality is heavily dependent upon the quality of the original submitted. The following explanation of techniques is provided to help you understand markings or patterns which may appear on this reproduction. 1.The sign or "target" for pages apparently lacking from the document photographed is "Missing Page(s)". If it was possible to obtain the missing page(s) or section, they are spliced into the film along with adjacent pages. This may have necessitated cutting thru an image and duplicating adjacent pages to insure you complete continuity. 2. When an image on the film is obliterated with a large round black mark, it is an indication that the photographer suspected that the copy may have moved during exposure and thus cause a blurred image. You will find a good image of the page in the adjacent frame. 3. When a map, drawing or chart, etc., was part of the material being photographed the photographer followed a definite method in "sectioning" the material. It is customary to begin photoing at the upper left hand corner of a large sheet and to continue photoing from left to right in equal sections w ith a small overlap. If necessary, sectioning is continued again — beginning below the first row and continuing on until complete. 4. The majority of users indicate that the textual content is of greatest value, however, a somewhat higher quality reproduction could be made from "photographs" if essential to the understanding of the dissertation.
    [Show full text]