Multi Robot Motion Planning with Communication

Total Page:16

File Type:pdf, Size:1020Kb

Multi Robot Motion Planning with Communication Multi-Robot Motion Planning with Communication A thesis submitted to the Graduate School of University of Cincinnati In the partial fulfillment of the requirements for the degree of Master of Science In the Department of Electrical and Computer Engineering Of the College of Engineering and Applied Science By Harmandeep Kaur Buttar Thesis Advisor and Committee Chair: Dr. Raj Bhatnagar Abstract A successful motion planning algorithm was designed and implemented on multiple high performance KheperaIII robots. 2 KheperaIII robots finds a dynamic path from the specified source to the targeted destination avoiding collisions in an unpredictable environment processing real-time data exchanged within robots by distributed communication on a well-spaced grid where boundaries are used as landmarks ascertained by the infrared sensors. Distributed communication was implemented by implementing server and client on every robot in the system with the help of multi-threads. This algorithm hence, is successful implementation in the field of motion planning and coordination with autonomous robots. Also in this thesis, is explained the centralized and decoupled behavior of the motion planning algorithms on the multi robots. The implementation of the algorithm over KheperaIII robots aimed at representing the successfulness of this technique in practical cases, as the work in this field is still relatively new. i ii Acknowledgements I would like to take this opportunity to express my gratitude to my thesis advisor, Dr. Raj Bhatnagar, whose guidance, encouragement and patience, inspired me to work on this project. I am extremely grateful to him for his support and co-operation which helped me in successfully completing my Master’s degree. I would also like to thank Dr. Carla Purdy and Dr. Manish Kumar for their presence on my thesis committee. I would also like to thank Robert Montjoy for his technical support in the research lab. Most importantly, I would like to thank my family and friends for their love and support. I would like to dedicate this work to them. iii Table of Contents Abstract…..…………………………………………………………….………….....…….i Acknowledgements……….………………….…………………..…………….………...iii Table of Contents……...………...………………………………….….........…...............iv List of figures…….………………………….…………………........………...………….vi Chapter 1. Introduction …………………………..……………………………………....1 1.1 Introduction…………………………………………………………….…………1 Chapter 2. Literature Review……………………………………………………………...6 2.1 Background…………………………………………..……………………............6 2.2 Introduction to Multi-Robot Motion Planning………………………………….....7 2.3 Technical Specifications for KheperaIII Robot…………………………………...8 Chapter 3. Algorithm……………………..……………………………………..….……10 3.1 Terminology Used..………….……..………………….……………………...…10 3.2 Assumptions made…………………………….………………….…...………....11 3.3 Motion Logic for the Robots……………………………………………………..12 3.4 Real-Time Distributed Communication………………………………………….13 3.5 Implementation of Real Time Communication………………………………….14 3.6 Pseudo-Code of the Algorithm…………………………………………………..15 Chapter 4. Results and Analysis…………………………………………………………22 Chapter 5. Conclusions and Future Work………………………………………………..26 5.1 Comparing Approaches……………………………………………………………...26 iv Bibliography ………………………………………………………………….……………30 v List of Figures Figure 1. Representation of the directions assigned in workspace………………………………12 Figure 2. Communication among robots sharing their real time position information………….14 Figure 3.The simple path taken by the robot from the specified source to the specified destination in workspace free of obstacles…………………………………………………………………...22 Figure 4. Movement of the multi-robot on the workspace with dynamic obstacles……………..24 Figure 5. Movements of multi-robot on the workspace with dynamic obstacles…………….28 vi Chapter 1: Introduction 1.1. Introduction This thesis addresses the problem of adjusting paths of robots in response to non-stationary obstacles encountered when the robots are following their paths towards their goal locations. We solve this problem in the context of distributed decision making, that is, when there is no central agent making plans for each of the robots. Also, some centralized agent does not inform the robots of their current locations, but each robot keeps track of its current location by counting the grid marks as it travels on a marked terrain. This situation is a simplified model for situations in which the robots determine their locations based only on local landmarks. We show in this thesis that our algorithm can achieve this goal in the context of two Khepera robots traversing a terrain marked by grid lines. The main problem that we address is of two robots starting from their starting cells on the grid and seeking to trade places by moving to each other’s location. On the way they seek to avoid running into each other. The collision avoidance is done only when the two robots are about to move into the same grid cell at the same time. Our focus is on developing a generalizable algorithm that can easily be adapted to many other similar situations. The path planning and collision avoidance algorithms defined in this thesis are executed in a distributed manner. We can state the difference between Centralized and Decentralized approaches by defining basic differences between these approaches as follows: 1. Centralized Approach: This approach, as name suggests, has a centralized approach to decision making. Every entity performs work based on decisions made by the central entity. The centralized approach has an advantage of completeness and global optimization, but a major disadvantage lies in high dimensional configuration spaces becoming computationally intensive [12]. 1 2. Decentralized Approach: This approach unlike centralized, is distributed in nature where decision-making is distributed among all the entities present in the system. They perform better in high dimensional configuration space systems. This algorithm implementation involves planning a trajectory from the source to the destination on a 2-dimensional grid, for two Khepera-III robots, and appropriately updating it based on the communication among the robots about their current locations and plans for movement in the immediate future. Robots use decentralized approach to path planning and collision avoidance by making their own decisions to reach from their source to destination locations avoiding the dynamic obstacles encountered along the way. The algorithm is tested for only two robots in this thesis but the approach is generalizable for more robots trying to achieve similar goals. Distributed artificial intelligence is an attractive field of research which deals with making machines perform intelligent tasks based on cooperative exchange of required information. Making multiple machines learn and imitate human intelligence and cooperative behavior while performing tasks is a challenging research topic and this thesis addresses a small problem in this direction. The field of artificial intelligence is characterized as :“The central problems of AI include such traits as reasoning, knowledge, planning, learning, communication, perception and the ability to move and manipulate objects” [1]. All these problems lead to the task of integrating artificial intelligence algorithms with the machines, to make the machines think and perform in the same manner as humans would perform under the given circumstances. The field of Distributed Artificial Intelligence aims to make groups of cooperative machines intelligent by sharing minimum requisite information among them about a specific task and then performing in a similar or superior fashion as compared to a group of cooperating humans. Such 2 intelligent groups of robots or autonomous agents are very useful in various applications such as industrial plants, space exploration, defense situations, and domestic chores. Recent commercial and research popularity of the autonomous and humanoid robots has directly hinted on the emphasis being placed upon the improvement of overall functionality of intelligent robots and their cooperative groups. One important area for autonomous robots is trajectory planning algorithms and obstacle avoidance during navigation, which is also an important research problem [13]. Navigation is an integral part of the autonomous robots for making coordinated movements of the robots possible. Path planning algorithms are designed to navigate the robots efficiently along the shortest possible paths in an unknown or known environment. One of the extensively studied problems in this area is the real time path planning of the robots with collision avoidance. This thesis addresses the path planning problems as real time problems to be solved, with our algorithm designed to keep the two robots from colliding while navigating along their paths. The path planning algorithms are designed based on a number of different types of criteria. The cost of the path taken to move from the source to the destination is one of the important criteria in path planning algorithms. Some of the real world applications which require and need to employ these algorithms include: Manufacturing floor: Manufacturing floor control is one such system where several "intelligent" entities work together to achieve a global manufacturing work instead of a central controller assigning jobs to these individual entities to achieve the respective result. The overall system links various machine tools/entities by different makers. Computers are embedded in this system to help
Recommended publications
  • View Document
    Application Report Date: 2016/05/05 For Region: All Time: 10:19:28 For Application Type: All Page: 1 For Application Status: ACCEPTED For Date Range: 2016/04/01 to 2016/04/30 Region Application Type Ref. No. Registered Name Status Date EC Retail New B/2016/04/20/0002 BLACK OIL HOLDINGS (PTY) LTD ACCEPTED - PENDING DOCUMENTATION 2016/04/20 EC Site New B/2016/04/20/0001 TRAKPROPS 146 (PTY) LTD ACCEPTED - PENDING DOCUMENTATION 2016/04/20 EC Retail New (Change-of-Hands) B/2016/04/25/0002 CALANDRA TRADING 669 CC ACCEPTED - PENDING DOCUMENTATION 2016/04/25 EC Retail New (Change-of-Hands) B/2016/04/25/0001 CALANDRA TRADING 669 CC ACCEPTED - PENDING DOCUMENTATION 2016/04/25 FS Retail New (Change-of-Hands) C/2016/04/29/0001 HECTOR AUSTIN ENGINEERING (PTY) LTD ACCEPTED - PENDING DOCUMENTATION 2016/04/29 FS Retail New (Change-of-Hands) C/2016/04/21/0001 DAIZEBEL (PTY) LTD ACCEPTED - PENDING DOCUMENTATION 2016/04/21 FS Retail New (Change-of-Hands) C/2016/04/26/0001 MAJA FUELS (PTY) LTD ACCEPTED - PENDING DOCUMENTATION 2016/04/26 FS Retail New (Change-of-Hands) C/2016/04/08/0001 MINOZEST (PTY) LTD ACCEPTED - PENDING DOCUMENTATION 2016/04/08 GP Retail New D/2016/04/22/0003 LAMANI BUSINESS ENTERPRISES (PTY) LTD ACCEPTED - PENDING DOCUMENTATION 2016/04/22 GP Retail Temporary D/2006/08/17/0015/T16/1 CJ & CK (PTY) LTD ACCEPTED 2016/04/14 GP Site New D/2016/04/22/0002 TOWER PROPERTY FUND LIMITED ACCEPTED - PENDING DOCUMENTATION 2016/04/22 GP Wholesale New D/2016/04/29/0001 JUNE PETROLEUM PTY LTD ACCEPTED - PENDING DOCUMENTATION 2016/04/29 GP Wholesale New
    [Show full text]
  • AMD Geode™ LX Processors Data Book
    AMD Geode™ LX Processors Data Book February 2007 Publication ID: 33234E AMD Geode™ LX Processors Data Book © 2007 Advanced Micro Devices, Inc. All rights reserved. The contents of this document are provided in connection with Advanced Micro Devices, Inc. (“AMD”) products. AMD makes no representations or warranties with respect to the accuracy or completeness of the contents of this publication and reserves the right to make changes to specifications and product descriptions at any time without notice. No license, whether express, implied, arising by estoppel or otherwise, to any intellectual property rights is granted by this publication. Except as set forth in AMD’s Standard Terms and Conditions of Sale, AMD assumes no liability whatsoever, and disclaims any express or implied warranty, relating to its products including, but not limited to, the implied warranty of mer- chantability, fitness for a particular purpose, or infringement of any intellectual property right. AMD’s products are not designed, intended, authorized or warranted for use as components in systems intended for surgical implant into the body, or in other applications intended to support or sustain life, or in any other application in which the failure of AMD’s product could create a situation where personal injury, death, or severe property or environmental damage may occur. AMD reserves the right to discontinue or make changes to its products at any time without notice. Contacts www.amd.com Trademarks AMD, the AMD Arrow logo, AMD Athlon, AMD Geode, and combinations thereof, and 3DNow! and GeodeLink, are trademarks of Advanced Micro Devices, Inc. AMD-K6 is a registered trademark of Advanced Micro Devices, Inc.
    [Show full text]
  • System/370 Model 145 Reference Summary
    System/370 Model 145 Reference Summary S229-2239-1 IBM Corporation, Field Support Documentation, Dept 927, Rochester, Minnesota 55901 PREFACE This publication is primarily intended for customer engineers servicing System/370 Model 145. Second Edition (September 1972) This is a major revision of, and makes 8229-2239-0 obsolete. Address any comments concerning the contents of this publication to: IBM, Field Support Documentation, Dept 927, Rochester, Minnesota 55901 © International Business Machines Corporation 1972 CONTENTS Section 1 - Control Words Branch and Module Switch Word "O" . 1. 1 Branch Word . 1.2 GA Function Charts . 1.3 GA Function Charts . 1.4 GA Function Charts . 1.5 Branch and Link or Return Word . 1.6 Word Move Word Version"O" . 1. 7 Word Move Word Version "1" . 1.8 Storage Word, Non K-Addressable . 1.9 Storage Word, K-Addressable . 1.10 Arithmetic Word 10 Byte Version 1.11 Arithmetic Word, Fullword Version 1.12 Arithmetic Word, 11 Direct ByteVersion . 1.13 Arithmetic Word, 10/11 Indirect Byte Version . 1.14 ALU Entry Gating 1.15 Stat Set Symbols . 1.15 BranchSymbols . 1.15 Arithmetic Word Chart Selection 1.16 Address Formation Chart 1.16 Control Word Chart Selection 1.16 Section 2 - CPU 3145 CPU Data Flow . 2.1 I-Cycles Data Flow . 2.2 I-Cycles . 2.3 PSW Locations . 2.3 Expanded Local Storage . 2.3 I-Cycles . 2.3 I-Cycles Control Line Generation . 2.4 Control Word . 2.4 Control Register Decode . 2.4 iii ECCL Board Layout ............ 2.5 Data Bit Location Chart .......... 2.5 Common Test Points ...........
    [Show full text]
  • Prioritization 4.0
    Prioritization 4.0 NCDOT Strategic Prioritization Office of Transportation July 2015 Agenda • Background • General Overview of Changes From P3.0 To P4.0 • Scoring and Scaling • Peak ADT • In-Depth Review of P4.0 Highway Criteria, Measures and Weights • In-Depth Review of P4.0 Non-Highway Criteria, Measures and Weights • Timeline/Schedule • SPOT On!ine • Local Input Methodologies and Best Practices 2 Background NCDOT is responsible for 6 modes of transportation: • Aviation (74 publicly‐owned airports) • Bicycle and Pedestrian • Ferries –2nd largest system in US (behind Washington) • Highways – Maintains 80,000 miles of highways (2nd only to Texas) • Public Transportation • Rail Annual Budget of approx. $4.1 B (federal dollars account for 25% of total budget) 3 Background Key Partners, as shown on colorful map below, include: • 19 Metropolitan Planning Organizations (MPOs) • 18 Rural Planning Organizations (RPOs) • 14 Field Offices (Divisions) *Unifour RPO has dissolved into adjacent MPOs 4 Strategic Transportation Investment (STI) New funding formula for NCDOT’s Capital Expenditures • Focus on Mobility/Expansion and Modernization projects for all modes House Bill 817 signed into Law June 26, 2013 Most significant transportation legislation in NC since 1989 Prioritization Workgroup charged with providing recommendations to NCDOT on weights and criteria. Reps include: • MPOs • RPOs • Division Engineers • Local Government Advocacy Groups 5 STI Legislation New funding formula for all capital expenditures, regardless of mode. All modes must
    [Show full text]
  • ILK]: Driver Should Make Sure the First 3D Command After the Engine Switch from BLT Not to Be 1
    Intel® OpenSource HD Graphics PRM Volume 1 Part 5: Graphics Core - Blitter Engine For the all new 2010 Intel Core Processor Family Programmer’s Reference Manual (PRM) March 2010 Revision 1.0 Doc Ref #: IHD_OS_V1Pt5_3_10 Creative Commons License You are free: to Share — to copy, distribute, display, and perform the work Under the following conditions: Attribution. You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). No Derivative Works. You may not alter, transform, or build upon this work. INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL’S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. Intel products are not intended for use in medical, life saving, or life sustaining applications. Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked "reserved" or "undefined." Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The Sandy Bridge chipset family, Havendale/Auburndale chipset family, Intel® 965 Express Chipset Family, Intel® G35 Express Chipset, and Intel® 965GMx Chipset Mobile Family Graphics Controller may contain design defects or errors known as errata which may cause the product to deviate from published specifications.
    [Show full text]
  • The New Tourism Lexicon: Rewriting Our Industry's Narrative
    POLICY BRIEF THE NEW TOURISM LEXICON: REWRITING OUR INDUSTRY'S NARRATIVE Last year, Destinations International released a policy "Washington is the problem. Remind voters again and brief entitled, “Advocacy in the Face of Ideology,” which again about Washington spending, Washington waste, made the case that relying on ROI numbers to defend Washington taxation, Washington bureaucracy, the value and relevancy of a destination organization Washington rules and Washington regulations." was no longer a viable advocacy strategy. Instead, we Luntz also suggested replacing "drilling for oil" with argued, destination organizations need to support the "exploring for energy," "undocumented workers" with message of ROI in terms of dollars and cents with an "illegal aliens," and "estate tax" with "death tax." The ideological and value-based appeal to convince political substitutions often work — an Ipsos/NPR poll found that leaders that without a destination organization, these support for abolishing the estate tax jumps to 76% from returns will inevitably vanish. 65% when you call it the death tax. Our industry has unfortunately fallen for what George Lakoff, a professor of Cognitive Science and Linguistics at the University of California at Berkeley, dubs the “Enlightenment Fallacy.” According to this viewpoint, you simply need to tell people the facts in clear language and they’ll reason to the right, true conclusions. The problem, as Lakoff puts it is, “The cognitive and brain sciences have shown this is false… it’s false in every single detail.” The reality is that people tend to frame political arguments, and the facts behind them, in terms of their own values.
    [Show full text]
  • Advanced Ipv6 Security in the LAN Gilles Roy, Technical Leader BRKSEC-3003 in 2015, 55% of Attacks Are from the Inside! *
    Advanced IPv6 Security in the LAN Gilles Roy, Technical Leader BRKSEC-3003 In 2015, 55% of attacks are from the inside! * Source: 2015 IBM Cyber Security Report 3 There is a lot happening on the LAN, it can be difficult to follow everything, lets break it down. 1. Operations 2. Attacks 3. Mitigations 4. Use cases 4 Use cases Enterprise SP Access Datacenter Address Allocation ✔ ✖ ✖ Duplicate Address Detection ✔ ✔ ✔ Address Resolution ✔ ✖ ✔ Operation Neighbor Unreachability Detection ✔ ✖ ✔ Prefix Allocation ✖ ✔ ✖ Making Default Router Discovery ✔ ✖ ✔ sense of Denial of Link Operations ✔ ✖ ✔ Denial of Address Resolution ✔ ✖ ✔ YOUR Router Theft ✔ ✔ ✔ Attacks Address Theft ✔ ✖ ✔ setup. Denial of Address Configuration ✔ ✔ ✖ Denial of Address Assignment ✔ ✖ ✖ RA Guard ✔ ✔ ✔ DHCP Guard ✔ ✔ ✖ Mitigation Source Guard ✔ ✖ ✔ Destination Guard ✔ ✖ ✖ Binding Guard ✔ ✖ ✔ 5 Abstract summary and pre-requisite • This session focuses on IPv6 security within the layer-2 domain • With a multi-dimensional approach: operations, vulnerabilities, mitigations and use-cases • It introduces security features at the First Hop, such RA Guard, Source Guard, Destination guard, etc • Requirements: Knowledge of IPv6 and IPv6 Neighbor Discovery 6 Agenda • IPv6 in the layer-2 domain: operations and protocols • IPv6 in the layer-2 domain: vulnerabilities • Attack Demonstration • Mitigating Vulnerabilities • Use cases overview 7 Some background on layer-2 & IPv6 • Layer-2: what is it? • Layer-2 domain: also “broadcast domain”, link, lan, vlan, segment • Nodes: hosts, routers,
    [Show full text]
  • Report on the Most Appropriate Indicators Related to the Basic Concepts
    D 4.1 – Report on the most appropriate indicators related to the basic concepts Report on the most appropriate indicators related to the basic concepts Deliverable D4.1 This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 870708 D 4.1 – Report on the most appropriate indicators related to the basic concepts Disclaimer: The contents of this deliverable are the sole responsibility of one or more Parties of the SmartCulTour consortium and can under no circumstances be regarded as reflecting the position of the Research Executive Agency and European Commission under the European Union’s Horizon 2020 programme. Copyright and Reprint Permissions “You may freely reproduce all or part of this paper for non-commercial purposes, provided that the following conditions are fulfilled: (i) to cite the authors, as the copyright owners (ii) to cite the SmartCulTour Project and mention that the EC co-finances it, by means of including this statement “Smart Cultural Tourism as a Driver of Sustainable Development of European Regions - SmartCulTour Project no. H2020-870708 co financed by EC H2020 program” and (iii) not to alter the information.” _______________________________________________________________________________________ How to quote this document: Petrić, L., Mandić, A., Pivčević, S., Škrabić Perić, B., Hell, M., Šimundić, B., Muštra, V., Mikulić, D., & Grgić, J. (2020). Report on the most appropriate indicators related to the basic concepts. Deliverable 4.1 of the Horizon 2020 project SmartCulTour (GA number 870708), published on the project web site on September 2020: http://www.smartcultour.eu/deliverables/ D 4.1 – Report on the most appropriate indicators related to the basic concepts This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No.
    [Show full text]
  • The (Many) Paths to “Destination X”
    Blog The (many) paths to “Destination X” Michelle Batten Head of Global Marketing, Mobile Division, Amadeus According to Amadeus’ new whitepaper, Better travel in the Live Travel Space “Get ready for Destination X,” today’s travel sellers have a golden opportunity to Destination X also offers enormous tap into destination services, a growing untapped potential to market and sell marketplace set to reach $183 billion by ancillary destination services to travelers. 2020. Drawing on survey results from It’s a place where travel agents, corporate more than a thousand CheckMyTrip by travel programs, and other providers of Amadeus mobile app users, the research flights, hotels and cars can continue identifies emerging trends about business servicing travelers at their final destination. and leisure travelers destined for Whether traveling on business, leisure or Destination X, one of the most important bleisure, mobile provides the perfect revenue-generating stops on a traveler’s platform to offer these destination services journey. on the move. Take me to travel nirvana Amadeus is helping travel providers better understand and address these challenges The Amadeus research poses questions and opportunities. Using the Amadeus such as, “Are travelers prepared as they Travel Platform, the Live Travel Space arrive to Destination X?” Are their needs aggregates all content into one platform, for add-on destination services like airport making it easier for travel sellers to find transfers, local activities and restaurant what they need, and provide the level of reservations being met? The paper personalization their travelers demand. explores eight trends regarding the challenges and opportunities travel sellers Are you ready to service customers more face in the post-booking ancillary game fully when they reach Destination X? and how you can win travelers trust in Download the whitepaper today at that arena.
    [Show full text]
  • Socomo Marketing for Travel and Tourism: Empowering Co-Creation of Value
    Journal of Destination Marketing & Management 4 (2015) 151–161 Contents lists available at ScienceDirect Journal of Destination Marketing & Management journal homepage: www.elsevier.com/locate/jdmm SoCoMo marketing for travel and tourism: Empowering co-creation of value Dimitrios Buhalis n, Marie Foerste School of Tourism Bournemouth University, United Kingdom article info abstract Article history: Advanced technology enables users to amalgamate information from various sources on their mobile Received 18 June 2014 devices, personalise their profile through applications and social networks, as well as interact Accepted 6 April 2015 dynamically with their context. Context-based marketing uses information and communication Available online 5 May 2015 technologies (ICTs) that recognise the physical environment of their users. Tourism marketers are Keywords: increasingly becoming aware of those cutting-edge ICTs that provide tools to respond more accurately to Personalisation the context within and around their users. This paper connects the different concepts of context-based Mobile context-awareness marketing, social media and personalisation, as well as mobile devices. It proposes social context mobile Social media marketing (SoCoMo) marketing as a new framework that enables marketers to increase value for all stakeholders at Mobile technologies the destination. Contextual information is increasingly relevant, as big data collected by a wide range of Co-creation sensors in a smart destination provide real-time information that can influence the tourist experience. SoCoMo marketing introduces a new paradigm for travel and tourism. It enables tourism organisations and destinations to revolutionise their offering and to co-create products and services dynamically with their consumers. The proposed SoCoMo conceptual model explores the emerging opportunities and challenges for all stakeholders.
    [Show full text]
  • A Key-Based Routing System for P4-Programmable Networks
    electronics Article P4-KBR: A Key-Based Routing System for P4-Programmable Networks Pilar Manzanares-Lopez * , Juan Pedro Muñoz-Gea and Josemaria Malgosa-Sanahuja Department of Information Technologies and Communications, Universidad Politecnica de Cartagena, E-30202 Cartagena, Spain; [email protected] (J.P.M.-G.); [email protected] (J.M.-S.) * Correspondence: [email protected]; Tel.: +34-968-326534 Abstract: Software-defined networking (SDN) architecture has provided well-known advantages in terms of network programmability, initially offering a standard, open, and vendor-agnostic interface (e.g., OpenFlow) to instruct the forwarding behavior of network devices from different vendors. However, in the last few years, data plane programmability has emerged as a promising approach to extend the network management allowing the definition and programming of customized and non-standardized protocols, as well as specific packet processing pipelines. In this paper, we propose an in-network key-based routing protocol called P4-KBR, in which end-points (hosts, contents or services) are identified by virtual identifiers (keys) instead of IP addresses, and where P4 network elements are programmed to be able to route the packets adequately. The proposal was implemented and evaluated using bmv2 P4 switches, verifying how data plane programmability offers a powerful tool to overcome continuing challenges that appear in SDN networks. Keywords: P4; routing; KBR; SDN Citation: Manzanares-Lopez, P.; Muñoz-Gea, J.P.; Malgosa-Sanahuja, J. 1. Introduction P4-KBR: A Key-Based Routing The idea of decoupling end-points (hosts, contents or services) from network ad- System for P4-Programmable dresses has been demanded in the last few years to provide support to enhanced services Networks.
    [Show full text]
  • Mbr Crew Take a Week at Destination X
    f e at u r e marks the spot ‘Destination X’ is a mountain bike holiday promising the best of natural Alpine singletrack — but would an epic hut-to-hut challenge prove a little too much of a good thing? Words: Ben Smith Photos: Roo Fowler 78 mbr april 2014 april 2014 mbr 79 hat goes up refuge adventure. Our guide, Oli, explained that f e at u r e must come it would be a challenge and a totally different down. that was experience from our trip thus far — there would the mantra that be less of the perfect singletrack we’d been riding, was repeating more uphill grind and a healthy dose of carrying, itself in my brain but that would be balanced by an sense of real as my aching legs/ remoteness, with stunning views and a huge back/arms/neck sense of achievement. Most of the group politely struggled their declined, but for the eight of us who were ‘in’, a way slowly up yet sense of nervous excitement started to take over. another almost- the next day we were up and away early. With sheer rock face, our trailpacks stuffed to bursting with food and cleated shoes slipping fresh kit we were on the first bus out of town for and sliding on smooth rock, 30lb of mountain the only bit of assisted climbing for two days. bike balanced precariously across my back, sweat from the nearby town of les Saises we hit a fire- pouring off my face. Mountain biking is meant to road climb that dragged us away from civilisation.
    [Show full text]